{"title":"A Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology","authors":"Ji-Wook Jung, Sihn-Hye Park, Seok-Won Lee","doi":"10.1109/RE51729.2021.00059","DOIUrl":null,"url":null,"abstract":"With the significant increase of various cyber threats, the strategies of the attacks are becoming more diverse. In particular, more attention needs to be paid to Advanced Persistent Threat (APT) attacks since these attacks are continuously performed on a specific target for an apparent purpose through numerous tactics and techniques without being discovered for a long time. Although it is difficult to detect and respond to such APT attacks, it is more challenging to elicit security requirements that sufficiently reflect these complex characteristics for proactive defense. To address this problem, we propose a tool that recommends security requirements for APT attacks using the Case-Based Problem Domain Ontology specialized for APT attacks.","PeriodicalId":440285,"journal":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 29th International Requirements Engineering Conference (RE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RE51729.2021.00059","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the significant increase of various cyber threats, the strategies of the attacks are becoming more diverse. In particular, more attention needs to be paid to Advanced Persistent Threat (APT) attacks since these attacks are continuously performed on a specific target for an apparent purpose through numerous tactics and techniques without being discovered for a long time. Although it is difficult to detect and respond to such APT attacks, it is more challenging to elicit security requirements that sufficiently reflect these complex characteristics for proactive defense. To address this problem, we propose a tool that recommends security requirements for APT attacks using the Case-Based Problem Domain Ontology specialized for APT attacks.