Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats

As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intellig...

Full description

Bibliographic Details
Main Authors: Ji-Wook Jung, Seok-Won Lee
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/3/1505
_version_ 1797625216262733824
author Ji-Wook Jung
Seok-Won Lee
author_facet Ji-Wook Jung
Seok-Won Lee
author_sort Ji-Wook Jung
collection DOAJ
description As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intelligence than typical cyberattacks. Many studies have investigated APT detection and defense methods; however, studies on security requirements that focus on non-technical factors and prevention are relatively few. Therefore, this study aims to provide attack information to users obtained by analyzing attack scenarios as well as security requirements to help the users understand and make decisions. To this end, we propose a method for extracting attack elements by providing users with templates for attack scenarios with different levels of abstraction. In addition, we use a problem domain ontology that is based on the concept of a case to provide users with attack analysis results and recommended security requirements. Our method uses case-based reasoning to retrieve similar cases, recommend reusable security requirements, and propose revision directions. The ontology can be improved by adding the solution to the problem as a new case. We conducted case studies and surveys to evaluate our methods and showed that they help specify security requirements.
first_indexed 2024-03-11T09:53:25Z
format Article
id doaj.art-d661adeb264f440e89232cf38bf4b89c
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T09:53:25Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-d661adeb264f440e89232cf38bf4b89c2023-11-16T16:06:27ZengMDPI AGApplied Sciences2076-34172023-01-01133150510.3390/app13031505Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent ThreatsJi-Wook Jung0Seok-Won Lee1Department of Artificial Intelligence, Ajou University, Suwon 16499, Republic of KoreaDepartment of Artificial Intelligence, Ajou University, Suwon 16499, Republic of KoreaAs the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intelligence than typical cyberattacks. Many studies have investigated APT detection and defense methods; however, studies on security requirements that focus on non-technical factors and prevention are relatively few. Therefore, this study aims to provide attack information to users obtained by analyzing attack scenarios as well as security requirements to help the users understand and make decisions. To this end, we propose a method for extracting attack elements by providing users with templates for attack scenarios with different levels of abstraction. In addition, we use a problem domain ontology that is based on the concept of a case to provide users with attack analysis results and recommended security requirements. Our method uses case-based reasoning to retrieve similar cases, recommend reusable security requirements, and propose revision directions. The ontology can be improved by adding the solution to the problem as a new case. We conducted case studies and surveys to evaluate our methods and showed that they help specify security requirements.https://www.mdpi.com/2076-3417/13/3/1505advanced persistent threatsecurity requirementproblem domain ontologycase-based reasoningartificial intelligencerecommendation system
spellingShingle Ji-Wook Jung
Seok-Won Lee
Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
Applied Sciences
advanced persistent threat
security requirement
problem domain ontology
case-based reasoning
artificial intelligence
recommendation system
title Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
title_full Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
title_fullStr Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
title_full_unstemmed Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
title_short Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
title_sort security requirement recommendation method using case based reasoning to prevent advanced persistent threats
topic advanced persistent threat
security requirement
problem domain ontology
case-based reasoning
artificial intelligence
recommendation system
url https://www.mdpi.com/2076-3417/13/3/1505
work_keys_str_mv AT jiwookjung securityrequirementrecommendationmethodusingcasebasedreasoningtopreventadvancedpersistentthreats
AT seokwonlee securityrequirementrecommendationmethodusingcasebasedreasoningtopreventadvancedpersistentthreats