DocumentCode :
3391177
Title :
Computer-assisted validation and verification of cybersecurity requirements
Author :
Drusinsky, Doron ; Michael, James Bret ; Otani, Thomas W. ; Shing, Man-Tak ; Wijesekera, Duminda
Author_Institution :
Dept. of Comput. Sci., Naval Postgrad. Sch., Monterey, CA, USA
fYear :
2010
fDate :
8-10 Nov. 2010
Firstpage :
93
Lastpage :
98
Abstract :
Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system´s requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.
Keywords :
Web services; formal specification; formal verification; security of data; UML statechart assertions; choreographed Web services; computer-aided formal validation; computer-aided formal verification; cyber attacks; cyber intrusions; formal requirements specifications; illegal business scheme detection; natural language cybersecurity requirements; Business; Computational modeling; Computer security; Natural languages; Unified modeling language; Web services; cybersecurity; forensics; statechart assertion; validation; verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2010 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4244-6047-2
Type :
conf
DOI :
10.1109/THS.2010.5655087
Filename :
5655087
Link To Document :
بازگشت