27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chung [4] treats security requirements as softgoals, that are<br />

identified and refined based on a knowledge catalogue of<br />

decomposition methods, security techniques for satisfying<br />

softgoals, and correlation rules. This approach focuses on the<br />

elicitation process of high level security goals. The i* framework<br />

[5] takes an organizational view by modeling trustworthiness<br />

as softgoals to be satisfied. Attacks by malicious<br />

users are modeled as negative contributions that obstruct<br />

these softgoals. Above all, i* focuses on analysis of security<br />

threats imposed by internal actors at the organizational level.<br />

Attack trees [10] adopt a goal-oriented approach to refining<br />

a root goal into a goal tree to derive scenarios. But this<br />

approach is best suited to design.<br />

Compared with the above work, our approach is at the<br />

analysis phase which treats the solution domain as a black<br />

box and focus on the domain. It complements the softgoal<br />

view by analysing external threats in software systems<br />

problem domains.<br />

The most relevant works are two supplementary approaches<br />

based on the PF. The first one is defined by Lin<br />

et al. [1]. They define so-called “anti-requirements” and the<br />

corresponding “abuse frames” to use the ideas underlying<br />

problem frames in security. An anti-requirement expresses<br />

the intentions of a malicious user, and an abuse frame<br />

represents a security threat. For a threat to be realised, its<br />

abuse frame must be composed with the base problem frame<br />

in the sense that the asset attacked in the abuse frame must<br />

overlap, or be identified with, a domain of the base problem<br />

frame. The purpose of anti-requirements and abuse frames is<br />

to analyze security threats and derive security requirements.<br />

Hatebur et al. [11][6] take a different approach using<br />

problem frames. Security requirements are expressed using a<br />

threat model. Security problem frames are used to consider<br />

security requirements. The goal is to construct a machine<br />

that fulfills the security requirements. Security problem<br />

frames strictly refer to the problems concerning security.<br />

In our work, the undesirable under-attack behaviors are<br />

actually captured as “anti-requirements”. Following Lin et<br />

al. ’s work, we provide a practicable way to obtain these<br />

anti-requirements.<br />

VI. CONCLUSION<br />

Based on the commanded behavior frame and the abuse<br />

frames, this paper proposes to elicit security requirements by<br />

constructing an act-effect model. This model is generated by<br />

referring to the properties of the environment in software<br />

environment ontology. The security requirements can be<br />

easily obtained from these act-effect models. The case study<br />

shows that our approach is feasible.<br />

An important benefit of our approach is the systematic and<br />

repeatable of the security requirements elicitation. The software<br />

environment ontology is used to guide the elicitation<br />

process, which greatly reduces the analysts’workload. Our<br />

approach is not a substitute for abuse frames or the other<br />

traditional security engineering techniques. We have found<br />

them to be useful in complementing such techniques when<br />

deployed during requirements analysis. We are currently<br />

examining ways of eliciting security requirements for the<br />

other basic problem frames.<br />

ACKNOWLEDGMENTS<br />

This work was supported by the National Basic Research<br />

and Development 973 Program of China (Grant<br />

No.2009CB320702), the National Natural Science Foundation<br />

of China (Grant No.61170084,No.90818026), and<br />

Creative Team of NSFC (Grant No.61021004), the Opening<br />

Fund of Top Key Discipline of Computer Software and<br />

Theory in Zhejiang Provincial Colleges at Zhejiang Normal<br />

University, as well as the National 863 High-tech Project of<br />

China (Grant No.2011AA010101).<br />

REFERENCES<br />

[1] L.Lin, B.Nuseibeh, D.Ince, M.Jackson, and J.Moffett, “Introducing<br />

abuse frames for analyzing security requirements,”<br />

in the 11th IEEE International Requirements Engineering<br />

Conference (RE’03), 2003, pp. 371–372.<br />

[2] I. Alexander, “Misuse cases: use cases with hostile intent,”<br />

IEEE Software, vol. 20, no. 1, pp. 58–66, 2003.<br />

[3] J. McDermott and C. Fox, “Using abuse case models for<br />

security requirements analysis,” in Annual Computer Security<br />

Applications Conference, 1999, pp. 6–10.<br />

[4] L. Chung, B. Nixon, E. Yu, and J. Mylopoulos, “Nonfunctional<br />

requirements in software engineering,” in Kluwer,<br />

2000.<br />

[5] L. Liu, E. Yu, and J. Mylopoulos, “Security and privacy<br />

requirements analysis within a social setting,” in International<br />

Conference on Requirements Engineering (RE03), 2003, pp.<br />

8–12.<br />

[6] H. Schmidt, D. Hatebur, and M. Heisel, A Pattern-Based<br />

Method to Develop Secure Software. IGI Global, 2011, ch. 3,<br />

pp. 32–74.<br />

[7] M.Jackson, Problem Frames: Analyzing and Structuring software<br />

development problems. Harlow, England:Addison-<br />

Wesley, 2001.<br />

[8] X.Chen, B. Yin, and Z. Jin, “An approach for capturing<br />

software requirements from interactive scenarios,” Chinese<br />

Jounal of Computer, vol. 34, no. 2, pp. 329–341, 2011, in<br />

Chinese.<br />

[9] G. Sindre and A. Opdahl, “Eliciting security requirements<br />

by misuse cases,” in 37th International Conference on Technology<br />

of Object-Oriented Languages and <strong>Systems</strong> (TOOLS-<br />

PACIFIC 2000), 2000.<br />

[10] B. Schneier, Attack Trees. Dr. Dobb’s Journal, 1999.<br />

[11] D. Hatebur, M. Heisel, and H. Schmidt, “Using problem<br />

frames for security engineeing,” Tech. Rep., 2006.<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!