A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

被引:0
|
作者
Golnaz Elahi
Eric Yu
Nicola Zannone
机构
[1] University of Toronto,
来源
Requirements Engineering | 2010年 / 15卷
关键词
Security requirements engineering; Risk analysis; Agent-oriented software engineering; Empirical security knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of vulnerabilities exploitation and analyzing the impact of countermeasures on such risks.
引用
收藏
页码:41 / 62
页数:21
相关论文
共 50 条
  • [1] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [2] Performance Analysis of Security Requirements Engineering Framework by Measuring the Vulnerabilities
    Prabhakaran, Salini
    Selvadurai, Kanmani
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 435 - 444
  • [3] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [4] Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks
    Abdullah, Muhammad Daniel Hafiz
    Hanapi, Zurina Mohd
    Zukarnain, Zuriati Ahmad
    Mohamed, Mohamad Afendee
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (04): : 1493 - 1515
  • [5] An Ontology Based Information Security Requirements Engineering Framework
    Chikh, Azeddine
    Abulaish, Muhammad
    Nabi, Syed Irfan
    Alghathbar, Khaled
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 139 - +
  • [6] Framework for Engineering Complex Security Requirements Patterns
    Mazo, Raul
    Feltus, Christophe
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
  • [7] Security requirements engineering: A framework for representation and analysis
    Haley, Charles B.
    Laney, Robin
    Moffett, Jonathan D.
    Nuseibeh, Bashar
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 133 - 153
  • [8] The usage-centric security requirements engineering (USeR) method
    Hallberg, Niklas
    Hallberg, Jonas
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 34 - +
  • [9] A Novel Method: Ontology-based Security Requirements Engineering Framework
    Salini, P.
    Kanmani, S.
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [10] BPMN extension evaluation for security requirements engineering framework
    Zareen, Saima
    Anwar, Syed Muhammad
    REQUIREMENTS ENGINEERING, 2024, 29 (02) : 261 - 278