Skip to main content

Aligning Misuse Case Oriented Quality Requirements Metrics with Machine Learning Approach

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 742))

Abstract

In the recent years, techniques and approaches associated with machine learning are being proposed to improvise the aspect of security of software product. These techniques and approaches of machine learning are proposed to cater to various phases of software development process for the implementation of security. This paper investigates the various approaches and techniques of machine learning used for security purpose. The research paper further explores how the alignment of misuse care oriented quality requirements framework metrics can be done with the eligible technique/approach of machine learning for specification and implementation of security requirements during the requirements engineering phase of software development process and also highlights the outcome of this alignment. The paper also presents some areas where further research work could be carried out to strengthen the security aspect of the software during its development process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rawat, M.S., Dubey, S.K.: Software defect prediction models for quality improvement: a literature study. IJCSI Int. J. Comput. Sci. Iss. 9(5), 288–296 (2012)

    Google Scholar 

  2. Batcheller, A., Fowler, S.C., Cunningham, R., Doyle, D., Jaeger, T., Lindqvist, U.: Building on the success of building security. IEEE Secur. Priv. 15(4), 85–87 (2017)

    Article  Google Scholar 

  3. Vijayakumar, K., Arun, C.: Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Cluster Comput., 1–12 (2017)

    Google Scholar 

  4. Sharma, B., Duer, K.A., Goldberg, R.M., Teilhet, S.D., Turnham, J.C., Wang, S., Xiao, H.: U.S. Patent No. 9,544,327. Washington, DC: U.S. Patent and Trademark Office (2017)

    Google Scholar 

  5. Chandra, K., Kapoor, G., Kohli, R., Gupta, A.: Improving software quality using machine learning. In: 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 115–118. IEEE (2016)

    Google Scholar 

  6. Banerjee, C., Banerjee, A., Sharma, S.K.: Use Case and Misuse Case in Eliciting Security Requirements: MCOQR Metrics Framework Perspective

    Google Scholar 

  7. Figl, K., Recker, J., Hidalga, A.N., Hardisty, A., Jones, A.: Security is nowadays an indispensable requirement in software systems. Traditional software engineering processes focus primarily on business requirements, leaving security as an afterthought to be addressed via generic “patched-on” defensive mechanisms. This approach is insufficient, and software systems need to have security functionality engineered within in a similar fashion as ordinary business…. Requir. Eng. 21(1), 107–129 (2016)

    Article  Google Scholar 

  8. Banerjee, C., Pandey, S.K.: Software security rules. SDLC Perspective (2009)

    Google Scholar 

  9. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2), 126–139 (2009)

    Article  Google Scholar 

  10. Dick, J., Hull, E., Jackson, K.: Requirements Engineering. Springer (2017)

    Google Scholar 

  11. Ismael, O.A., Song, D., Ha, P.T., Gilbert, P.J., Xue, H.: U.S. Patent No. 9,594,905. Washington, DC: U.S. Patent and Trademark Office (2017)

    Google Scholar 

  12. Witten, I.H., Frank, E., Hall, M. A., Pal, C.J.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann (2016)

    Google Scholar 

  13. Poonia, A.S., Banerjee, C., Banerjee, A., Sharma, S.K.: Vulnerability identification and misuse case classification framework. In: Soft Computing: Theories and Applications, pp. 659–666. Springer, Singapore (2018)

    Google Scholar 

  14. Banerjee, C., Banerjee, A., Poonia, A.S., Sharma, S.K.: Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase. In: Soft Computing: Theories and Applications, pp. 651–658. Springer, Singapore (2018)

    Google Scholar 

  15. Riaz, M., Elder, S., Williams, L.: Systematically developing prevention, detection, and response patterns for security requirements. In: IEEE International Requirements Engineering Conference Workshops (REW), pp. 62–67, Sept., 2016. IEEE

    Google Scholar 

  16. Bozorgi, M., Saul, L.K., Savage, S., Voelker, G.M.: Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 105–114. ACM (2010)

    Google Scholar 

  17. Alves, H., Fonseca, B., Antunes, N.: Experimenting machine learning techniques to predict vulnerabilities. In: 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), pp. 151–156. IEEE (2016)

    Google Scholar 

  18. Webster, A.: A Comparison of Transfer Learning Algorithms for Defect and Vulnerability Detection (2017)

    Google Scholar 

  19. Banerjee, C., Pandey, S.K.: Research on software security awareness: problems and prospects. ACM SIGSOFT Softw. Eng. Notes 35(5), 1–5 (2010)

    Article  Google Scholar 

  20. Han, Z., Li, X., Xing, Z., Liu, H., Feng, Z.: Learning to predict severity of software vulnerability using only vulnerability description. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 125–136. IEEE (2017)

    Google Scholar 

  21. Banerjee, C., Banerjee, A., Pandey, S.K.: MCOQR (Misuse Case-Oriented Quality Requirements) Metrics Framework. In Problem Solving and Uncertainty Modeling through Optimization and Soft Computing Applications, pp. 184–209. IGI Global (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajeet Singh Poonia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Poonia, A.S., Banerjee, C., Banerjee, A., Sharma, S.K. (2019). Aligning Misuse Case Oriented Quality Requirements Metrics with Machine Learning Approach. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_64

Download citation

Publish with us

Policies and ethics