Title :
Identifying Security Requirements Hybrid Technique
Author :
Gandotra, Vandana ; Singhal, Archana ; Bedi, Punam
Author_Institution :
Univ. of Delhi, Delhi, India
Abstract :
There were times when software systems and networks posed no or very little security problems. However, with expanding connectivity during last few years problem of security has been making headlines. This is due to increase in threat environment and breach of security vital to the interest of end users. Keeping in view the security requirements in the present system all the attack points which can be threatened have to be identified, analyzed and remedial measures taken at the initial stage of software development process. The use of multiple techniques is the subject of research for deriving security requirements. In this paper, we are overlapping misuse case and attack trees techniques to propose a new technique named "Hybrid Technique". This Hybrid Technique merges the strengths of misuse cases and attack trees making the system stronger to mitigate weaknesses effectively in large and complex systems. In our approach we firstly identify threats using the concepts of threat modeling, and then map these threats into security requirements using Hybrid Technique. In the case study, we have used this technique for specifying security requirements for wireless hotspots.
Keywords :
security of data; software engineering; attack trees techniques; hybrid technique; misuse case technique; software development process; software security requirements; threat concept modeling; wireless hotspots; Communication system security; Information analysis; Information security; Programming; Risk management; Software engineering; Software measurement; Software systems; Software testing; attack trees; hybrid technique; misuse case; threat modeling; twin attack.;
Conference_Titel :
Software Engineering Advances, 2009. ICSEA '09. Fourth International Conference on
Conference_Location :
Porto
Print_ISBN :
978-1-4244-4779-4
Electronic_ISBN :
978-0-7695-3777-1
DOI :
10.1109/ICSEA.2009.65