A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities

被引:0
|
作者
Golnaz Elahi
Eric Yu
Nicola Zannone
机构
[1] University of Toronto,
来源
Requirements Engineering | 2010年 / 15卷
关键词
Security requirements engineering; Risk analysis; Agent-oriented software engineering; Empirical security knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities to assist system designers in analyzing vulnerabilities and their effects on the system; identifying potential attackers and analyzing their behavior for compromising the system; and identifying and analyzing the countermeasures to protect the system. The framework proposes a qualitative goal model evaluation analysis for assessing the risks of vulnerabilities exploitation and analyzing the impact of countermeasures on such risks.
引用
收藏
页码:41 / 62
页数:21
相关论文
共 50 条
  • [21] Model Oriented Security Requirements Engineering (MOSRE) Framework for Web Applications
    Salini, P.
    Kanmani, S.
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 341 - +
  • [22] REInDetector: A Framework for Knowledge-Based Requirements Engineering
    Tuong Huan Nguyen
    Bao Quoc Vo
    Lumpe, Markus
    Grundy, John
    2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 386 - 389
  • [23] KBRE: a framework for knowledge-based requirements engineering
    Tuong Huan Nguyen
    Bao Quoc Vo
    Markus Lumpe
    John Grundy
    Software Quality Journal, 2014, 22 : 87 - 119
  • [24] KBRE: a framework for knowledge-based requirements engineering
    Tuong Huan Nguyen
    Bao Quoc Vo
    Lumpe, Markus
    Grundy, John
    SOFTWARE QUALITY JOURNAL, 2014, 22 (01) : 87 - 119
  • [25] Ontology-based active requirements engineering framework
    Lee, SW
    Gandhi, RA
    12TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2005, : 481 - 488
  • [26] Addressing Data-Centric Security Requirements for IoT-Based Systems
    Rodriguez, Juan D. Parra
    Schreckling, Daniel
    Posegga, Joachim
    2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 1 - 10
  • [27] Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [28] A Tool-based Semantic Framework for Security Requirements Specification
    Daramola, Olawande
    Sindre, Guttorm
    Moser, Thomas
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (13) : 1940 - 1962
  • [29] Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies
    Bulusu, Sravani Teja
    Laborde, Romain
    Wazan, Ahmad Samer
    Barrere, Francois
    Benzekri, Abdelmalek
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1316 - 1318
  • [30] Vector: A Quantitative Security Requirements Evaluation Approach based on Assets, Vulnerabilities and Trustworthiness of Environment
    Long, Teng
    Liu, Lin
    Yu, Yijun
    Jin, Zhi
    PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2009, : 377 - +