• Keine Ergebnisse gefunden

Towards maintaining long-living information systems by incorporating security knowledge

N/A
N/A
Protected

Academic year: 2022

Aktie "Towards maintaining long-living information systems by incorporating security knowledge"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Towards Maintaining Long-Living Information Systems by Incorporating Security Knowledge

Stefan G¨artner1, Thomas Ruhroth2, Jens B¨urger2, Kurt Schneider1, Jan J¨urjens2,3

1Leibniz Universit¨at Hannover, Germany

2TU Dortmund, Germany

3Fraunhofer ISST, Germany stefan.gaertner@inf.uni-hannover.de

Abstract:Modern information systems are increasingly complex and need to operate in evolving environments. As a consequence, systems must co-evolve to keep up-to- date with their environments. This is especially important for security properties, since changes and patches tend to compromise them. We propose a security assessment ap- proach for natural language requirements for systematic co-evolution. Our evaluation and tool implementation show security benefits for maintaining long-living systems.

1 Evolving Environment impacts Requirements

It is essential for software engineers to be acquainted with the requirements and their re- lationships to security properties when they maintain security of long-living software sys- tems. They cannot design a secure system unless they understand the threats to security and their interrelationship within an evolving environment. However, software engineers usually do not have a complete overview of the knowledge necessary to assess require- ments with respect to security.

Requirements describe the intended functionality of a system. Design flaws and vulner- abilities are often revealed under changed conditions. Therefore, environmental changes may have an impact on requirements. Identifying these flaws is important to restore af- fected security properties of the system. However, analyzing a huge amount of natural language requirements manually is a laborious task. The impact of knowledge changes on requirements needs to be derived semi-automatically.

The work we present in this paper is part of the research projectSecVolution. In SecVolu- tion, we consider long-living information systems and how to retain its security in face of constantly changing requirements and evolving environmental knowledge [BJR+14].

This research is funded by the DFG project SecVolution which is part of the priory program SPP 1593

“Design For Future - Managed Software Evolution”.

83

(2)

2 Heuristic Security Assessment on Requirements

To cope with security problems successfully, a high level of expertise is required. It con- sists of a mixture of textbook knowledge, security obligations and laws, as well as experi- ence comprising typical and exceptional cases. Especially for novices it is difficult to find the relevant information for a particular issue.

To overcome this knowledge gap, a knowledge model is used in our approach to man- age security-related knowledge. We conducted a quasi-systematic literature review to find primary security concepts and their relationships applicable for different domains. It com- prises primary security concepts which can be found in the examined models in one or the other way [GRB+14]. The knowledge model can be extended using layered ontologies in order to fulfill further domain- or project-specific requirements [RGB+14].

To determine the impact of changes on requirements, we developed a heuristic security assessment approach. It identifies vulnerabilities (and their variations) in natural lan- guage requirements by leveraging security knowledge and natural language processing [GRB+14]. In particular, our approach relies on reported incidents and common attack patterns. We focus on requirements in form of use cases as they describe the interaction of the system with several actors as well as other systems.

The aim of our approach is to enable software engineers to react faster and more effectively to environmental changes. Heuristics are correct in many cases, based on previous experi- ences. However, there may be false positives. Therefore, findings must be verified by the software engineer or security expert. Nevertheless, reducing the amount of requirements which may contain security issues is beneficial.

To evaluate our approach, we conducted a case study using iTrust. The evaluation indicates that the proposed requirements assessment detects vulnerable requirements more reliable than other methods (Bayes, SVM, k-NN). Thus, the case study and tool implementation show the benefits for maintaining long-living systems.

References

[BJR+14] J. B¨urger, J. J¨urjens, T. Ruhroth, S. G¨artner, and K. Schneider. Model-based Security Engineering with UML: Managed Co-Evolution of Security Knowledge and Software Models. In A. Aldini, J. Lopez, and F. Martinelli, editors, Foundations of Security Analysis and Desing VII: FOSAD Tutorial Lectures, volume 8604 ofLNCS, pages 34–

53. Springer, 2014.

[GRB+14] S. G¨artner, T. Ruhroth, J. B¨urger, K. Schneider, and J. J¨urjens. Maintaining Require- ments for Long-Living Software Systems by Incorporating Security Knowledge. In 22nd IEEE International Requirements Engineering Conference, pages 103–112, 2014.

[RGB+14] T. Ruhroth, S. G¨artner, J. B¨urger, J. J¨urjens, and K. Schneider. Towards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems. InPro- ceedings of the 15th International Conference on Product Focused Software Process Improvement (PROFES), volume 8892 ofLNCS, pages 239–253. Springer, 2014.

84

Referenzen

ÄHNLICHE DOKUMENTE

Der Beitrag “Challenges in Secure Software Evolution - The Role of Software Architec- ture” befasst sich mit den Herausforderungen der Evolution von Software bezogen

We identified typical evolution scenarios in the industrial automation domain and conducted an ex- tensive literature search to extract a number of guidelines for sustainable

In this paper, the combination of goal oriented requirements engineering and feature modeling results in an enhanced version of the feature model for a product line, addressing

Divergence of points-of-view is unavoidable in complex information systems [2, 9], and we think that unlike both existing applications and wikis, actors should have a private

From a conceptual viewpoint, the access control system for multi-institutional research in life science should follow the common patterns and principles for distributed cross- domain

According to COBIT, one of the critical success factors for the process DS5: ”Ensure Systems Security” is the existence of an overall security plan that includes the building

The preferences (goals, values) of a n organization are generally regarded as deriving from, the preferences of individuals.. Capitalist economics assumes these to

On a regional basis, man-made pollution can overcome global level by hundreds of times and can be easily recognized. This situation has served to create two monitoring systems to