Title :
Computer-assisted validation and verification of cybersecurity requirements
Author :
Drusinsky, Doron ; Michael, James Bret ; Otani, Thomas W. ; Shing, Man-Tak ; Wijesekera, Duminda
Author_Institution :
Dept. of Comput. Sci., Naval Postgrad. Sch., Monterey, CA, USA
Abstract :
Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system´s requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.
Keywords :
Web services; formal specification; formal verification; security of data; UML statechart assertions; choreographed Web services; computer-aided formal validation; computer-aided formal verification; cyber attacks; cyber intrusions; formal requirements specifications; illegal business scheme detection; natural language cybersecurity requirements; Business; Computational modeling; Computer security; Natural languages; Unified modeling language; Web services; cybersecurity; forensics; statechart assertion; validation; verification;
Conference_Titel :
Technologies for Homeland Security (HST), 2010 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4244-6047-2
DOI :
10.1109/THS.2010.5655087