A fuzzy-based technique for describing security requirements of intrusion tolerant systems
To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventua...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science & Engineering Research Support Society
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/30570/1/A%20fuzzy.pdf |
_version_ | 1825947732881178624 |
---|---|
author | Mougouei, Davoud Wan Ab. Rahman, Wan Nurhayati |
author_facet | Mougouei, Davoud Wan Ab. Rahman, Wan Nurhayati |
author_sort | Mougouei, Davoud |
collection | UPM |
description | To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not
always possible to entirely identify and mitigate the security threats. This may eventually lead to security failure of the target system. To avoid security failure, it is required to incorporate fault tolerance (i.e. intrusion tolerant) into the security requirements of the system. In this paper, we propose a new technique toward description of
security requirements of Intrusion Tolerant Systems (ITS) using fuzzy logic. We care for intrusion tolerance in security requirements of the system through considering partial satisfaction of security goals. This partiality is accepted and formally described through establishment of a Goal-Based Fuzzy Grammar (GFG) and its respective Goal
-Based Fuzzy Language (GFL) for describing Security Requirement Model (SRM) of the target ITS. |
first_indexed | 2024-03-06T08:17:58Z |
format | Article |
id | upm.eprints-30570 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T08:17:58Z |
publishDate | 2013 |
publisher | Science & Engineering Research Support Society |
record_format | dspace |
spelling | upm.eprints-305702015-10-07T08:10:46Z http://psasir.upm.edu.my/id/eprint/30570/ A fuzzy-based technique for describing security requirements of intrusion tolerant systems Mougouei, Davoud Wan Ab. Rahman, Wan Nurhayati To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventually lead to security failure of the target system. To avoid security failure, it is required to incorporate fault tolerance (i.e. intrusion tolerant) into the security requirements of the system. In this paper, we propose a new technique toward description of security requirements of Intrusion Tolerant Systems (ITS) using fuzzy logic. We care for intrusion tolerance in security requirements of the system through considering partial satisfaction of security goals. This partiality is accepted and formally described through establishment of a Goal-Based Fuzzy Grammar (GFG) and its respective Goal -Based Fuzzy Language (GFL) for describing Security Requirement Model (SRM) of the target ITS. Science & Engineering Research Support Society 2013-03 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/30570/1/A%20fuzzy.pdf Mougouei, Davoud and Wan Ab. Rahman, Wan Nurhayati (2013) A fuzzy-based technique for describing security requirements of intrusion tolerant systems. International Journal of Software Engineering and its Applications, 7 (2). pp. 99-112. ISSN 1738-9984 http://www.sersc.org/journals/IJSEIA/vol7_no2_2013.php |
spellingShingle | Mougouei, Davoud Wan Ab. Rahman, Wan Nurhayati A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title | A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title_full | A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title_fullStr | A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title_full_unstemmed | A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title_short | A fuzzy-based technique for describing security requirements of intrusion tolerant systems |
title_sort | fuzzy based technique for describing security requirements of intrusion tolerant systems |
url | http://psasir.upm.edu.my/id/eprint/30570/1/A%20fuzzy.pdf |
work_keys_str_mv | AT mougoueidavoud afuzzybasedtechniquefordescribingsecurityrequirementsofintrusiontolerantsystems AT wanabrahmanwannurhayati afuzzybasedtechniquefordescribingsecurityrequirementsofintrusiontolerantsystems AT mougoueidavoud fuzzybasedtechniquefordescribingsecurityrequirementsofintrusiontolerantsystems AT wanabrahmanwannurhayati fuzzybasedtechniquefordescribingsecurityrequirementsofintrusiontolerantsystems |