Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats
As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intellig...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/3/1505 |
_version_ | 1797625216262733824 |
---|---|
author | Ji-Wook Jung Seok-Won Lee |
author_facet | Ji-Wook Jung Seok-Won Lee |
author_sort | Ji-Wook Jung |
collection | DOAJ |
description | As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intelligence than typical cyberattacks. Many studies have investigated APT detection and defense methods; however, studies on security requirements that focus on non-technical factors and prevention are relatively few. Therefore, this study aims to provide attack information to users obtained by analyzing attack scenarios as well as security requirements to help the users understand and make decisions. To this end, we propose a method for extracting attack elements by providing users with templates for attack scenarios with different levels of abstraction. In addition, we use a problem domain ontology that is based on the concept of a case to provide users with attack analysis results and recommended security requirements. Our method uses case-based reasoning to retrieve similar cases, recommend reusable security requirements, and propose revision directions. The ontology can be improved by adding the solution to the problem as a new case. We conducted case studies and surveys to evaluate our methods and showed that they help specify security requirements. |
first_indexed | 2024-03-11T09:53:25Z |
format | Article |
id | doaj.art-d661adeb264f440e89232cf38bf4b89c |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T09:53:25Z |
publishDate | 2023-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-d661adeb264f440e89232cf38bf4b89c2023-11-16T16:06:27ZengMDPI AGApplied Sciences2076-34172023-01-01133150510.3390/app13031505Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent ThreatsJi-Wook Jung0Seok-Won Lee1Department of Artificial Intelligence, Ajou University, Suwon 16499, Republic of KoreaDepartment of Artificial Intelligence, Ajou University, Suwon 16499, Republic of KoreaAs the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose. These attacks involve more planning and intelligence than typical cyberattacks. Many studies have investigated APT detection and defense methods; however, studies on security requirements that focus on non-technical factors and prevention are relatively few. Therefore, this study aims to provide attack information to users obtained by analyzing attack scenarios as well as security requirements to help the users understand and make decisions. To this end, we propose a method for extracting attack elements by providing users with templates for attack scenarios with different levels of abstraction. In addition, we use a problem domain ontology that is based on the concept of a case to provide users with attack analysis results and recommended security requirements. Our method uses case-based reasoning to retrieve similar cases, recommend reusable security requirements, and propose revision directions. The ontology can be improved by adding the solution to the problem as a new case. We conducted case studies and surveys to evaluate our methods and showed that they help specify security requirements.https://www.mdpi.com/2076-3417/13/3/1505advanced persistent threatsecurity requirementproblem domain ontologycase-based reasoningartificial intelligencerecommendation system |
spellingShingle | Ji-Wook Jung Seok-Won Lee Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats Applied Sciences advanced persistent threat security requirement problem domain ontology case-based reasoning artificial intelligence recommendation system |
title | Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats |
title_full | Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats |
title_fullStr | Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats |
title_full_unstemmed | Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats |
title_short | Security Requirement Recommendation Method Using Case-Based Reasoning to Prevent Advanced Persistent Threats |
title_sort | security requirement recommendation method using case based reasoning to prevent advanced persistent threats |
topic | advanced persistent threat security requirement problem domain ontology case-based reasoning artificial intelligence recommendation system |
url | https://www.mdpi.com/2076-3417/13/3/1505 |
work_keys_str_mv | AT jiwookjung securityrequirementrecommendationmethodusingcasebasedreasoningtopreventadvancedpersistentthreats AT seokwonlee securityrequirementrecommendationmethodusingcasebasedreasoningtopreventadvancedpersistentthreats |