Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ICSEA.2009.65guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Identifying Security Requirements Hybrid Technique

Published: 20 September 2009 Publication History

Abstract

There were times when software systems and networks posed no or very little security problems. However, with expanding connectivity during last few years problem of security has been making headlines. This is due to increase in threat environment and breach of security vital to the interest of end users. Keeping in view the security requirements in the present system all the attack points which can be threatened have to be identified, analyzed and remedial measures taken at the initial stage of software development process. The use of multiple techniques is the subject of research for deriving security requirements. In this paper, we are overlapping misuse case and attack trees techniques to propose a new technique named “Hybrid Technique”. This Hybrid Technique merges the strengths of misuse cases and attack trees making the system stronger to mitigate weaknesses effectively in large and complex systems. In our approach we firstly identify threats using the concepts of threat modeling, and then map these threats into security requirements using Hybrid Technique. In the case study, we have used this technique for specifying security requirements for wireless hotspots.

Cited By

View all
  • (2014)Comparing attack trees and misuse cases in an industrial settingInformation and Software Technology10.1016/j.infsof.2013.10.00456:3(294-308)Online publication date: 1-Mar-2014
  • (2013)Mitigating multi-threats optimally in proactive threat managementACM SIGSOFT Software Engineering Notes10.1145/2413038.241304138:1(1-7)Online publication date: 23-Jan-2013
  • (2011)Layered security architecture for threat management using multi-agent systemACM SIGSOFT Software Engineering Notes10.1145/2020976.202098436:5(1-11)Online publication date: 30-Sep-2011
  1. Identifying Security Requirements Hybrid Technique

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICSEA '09: Proceedings of the 2009 Fourth International Conference on Software Engineering Advances
    September 2009
    584 pages
    ISBN:9780769537771

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 September 2009

    Author Tags

    1. attack trees
    2. hybrid technique
    3. misuse case
    4. threat modeling
    5. twin attack.

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Comparing attack trees and misuse cases in an industrial settingInformation and Software Technology10.1016/j.infsof.2013.10.00456:3(294-308)Online publication date: 1-Mar-2014
    • (2013)Mitigating multi-threats optimally in proactive threat managementACM SIGSOFT Software Engineering Notes10.1145/2413038.241304138:1(1-7)Online publication date: 23-Jan-2013
    • (2011)Layered security architecture for threat management using multi-agent systemACM SIGSOFT Software Engineering Notes10.1145/2020976.202098436:5(1-11)Online publication date: 30-Sep-2011

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media