Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 348-352.

• Information Security • Previous Articles     Next Articles

Analysis Research of Software Requirement Safety Based on Neural Network and NLP

SUN Bao-hua1,3, HU Nan3, LI Dong-yang2,3   

  1. Jilin University,Changchun 130012,China1;
    Northeastern University,Shenyang 110819,China2;
    State Grid Liaoning Electric Power Co.,Ltd.,Shenyang 110004 ,China3
  • Online:2019-06-14 Published:2019-07-02

Abstract: To identify the incompleteness and ambiguity of software requirements and build a bridge between software requirements and standard specifications,this paper proposed a model of analysis and evaluation based on the Natural Language Processing (NLP) and neural network.Firstly,from ISO,the open-source Web application security plan (OWASP) and the PCI directory,multiple security specification features are identified,and text implication relationships are found.Then,the implication results and text annotations are used to train the neural network model to predict whether a certain statement in the document is available.The proposed model evaluates the performance of each implication configuration.The results show that the average F- score of the implicative configuration 9 is the highest,which is the best completeness predictor.Moreover,the performance of the proposed model is better than that of the null model under optimal and worst allocation.

Key words: Implication relationships, Natural language processing, Neural networks model, Null model, Security, Software requirements

CLC Number: 

  • TP391
[2]MALHOTRA R,CHUG A,HAYRAPETIAN A,et al.Analyzing and evaluating security features in software requirements[C]∥International Conference on Innovation and Challenges in Cyber Security.2016:26-30.
[5]KNAUSS E,OTT D.(Semi-) automatic Categorization of Natural Language Requirements[C]∥International Working Conference on Requirements Engineering:Foundation for Software Quality.Springer International Publishing,2014:39-54.
[8]TAKAHASHI T,KANNISTO J,HARJU J,et al.Expressing Security Requirements:Usability of Taxonomy-Based Requirement Identification Scheme[C]∥IEEE World Congress on Services.IEEE Computer Society,2014:121-128.
[10]RANTOS K,MARKANTONAKIS K.Analysis of Potential Vulnerabilities in Payment Terminals[M]∥Secure Smart Embedded Devices,Platforms and Applications.Springer New York,2014:311-333.
[15]GOLIA S,SIMONETTO A.Treating ordinal data:a comparison between rating scale and structural equation models[J].Quality &Quantity,2015,49(3):903-915.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[4] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[5] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[6] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[7] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[8] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] LI Xiao-wei, SHU Hui, GUANG Yan, ZHAI Yi, YANG Zi-ji. Survey of the Application of Natural Language Processing for Resume Analysis [J]. Computer Science, 2022, 49(6A): 66-73.
[11] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[12] KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158.
[13] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[14] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[15] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
Full text



No Suggested Reading articles found!