A Binary Classification of Software Security Requirements: A Deep Learning Approach

Abstract

The current work proposes a hybrid deep learning approach for classification of software security requirements based on the DOSSPRE dataset.[12] publish a work on software requirements classification where a software requirement dataset named DOSSPRE have been generated. They mentioned that the non classification of security requirements has been identified as a major source of security concerns in the software development process. For that reason, they give an approach to classify security requirement, but they didn’t consider deep learning as classification technique. The literature review show that, the application of machine learning techniques for software requirements classification is increasing these last years but in the most of application cases classical assemblage techniques are prioritized and deep learning techniques are used in just few cases, due to his complexity and the necessary resources like the needed amount of input data and a high computational power to achieved the expected results. This study contributes to fill the gap in application of deep learning technique for software security requirement classification. A novel approach for hybrid machine learning model is proposed based on naïve bayes model (MNB_Model) and a deep learning model. Three hybrid machine learning models are compared: a deep neural network (DNN-MNB_Model), a convolutional neural network (CNN-MNB_Model) and a recurrent neural network (RNN-MNB_Model). The results of the comparison show that the CNN-MNB_Model get the best performance with 80.2% accuracy.

Country : Switzerland

1 Landry Giraud Wandji T.

  1. Ph.D. Student at the Hochschulinstitut Schaffhausen, Switzerland

IRJIET, Volume 9, Issue 9, September 2025 pp. 1-9

doi.org/10.47001/IRJIET/2025.909001

References

  1. Ahmed H Almulihi et al. “Analyzing the Implications of Healthcare Data Breaches through Computational Technique.” In: Intelligent Automation & Soft Computing 32.3 (2022).
  2. Oluwasefunmi T Arogundade et al. “Enhancing misuse cases with risk assessment for safety requirements”. In: IEEE Access 8 (2020), pp. 12001– 12014.
  3. Xiang Chen et al. “Automatic classification of user requirements information based on convolutional neural network”. In: 2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT). IEEE. 2021, pp. 137– 141.
  4. Jane Cleland-Huang et al. “Automated classification of non-functional requirements”. In: Requirements engineering 12 (2007), pp. 103–120.
  5. Fabiano Dalpiaz et al. “Requirements classification with interpretable machine learning and dependency parsing”. In: 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE. 2019, pp. 142–152.
  6. Edna Dias Canedo and Bruno Cordeiro Mendes. “Software requirements classification using machine learning algorithms”. In: Entropy 22.9 (2020), p. 1057.
  7. Donald Firesmith et al. “Engineering security requirements.” In: J. Object Technol. 2.1 (2003), pp. 53–68.
  8. Md Ariful Haque, Md Abdur Rahman, and Md Saeed Siddik. “Nonfunctional requirements classification with feature extraction and machine learning: An empirical study”. In: 2019 1st international conference on advances in science, engineering and robotics technology (ICASERT). IEEE. 2019, pp. 1–5.
  9. Shoaib Hassan et al. “A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities”. In: CAAI Transactions on Intelligence Technology 9.6 (2024).
  10. Rajni Jindal, Ruchika Malhotra, and Abha Jain. “Automated classification of security requirements”. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE. 2016, pp. 2027–2033.
  11. Ji-Wook Jung, Sihn-Hye Park, and Seok-Won Lee. “A tool for security requirements recommendation using case-based problem domain ontology”. In: 2021 IEEE 29th international requirements engineering conference (RE). IEEE. 2021, pp. 438–439.
  12. Prudence Kadebu et al. “A classification approach for software requirements towards maintainable security”. In: Scientific African 19 (2023), e01496.
  13. Eric Knauss et al. “Supporting requirements engineers in recognising security issues”. In: Requirements Engineering: Foundation for Software Quality: 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings 17. Springer. 2011, pp. 4–18.
  14. Zijad Kurtanović and Walid Maalej. “Automatically classifying functional and non-functional requirements using supervised machine learning”. In: 2017 IEEE 25th international requirements engineering conference (RE). Ieee. 2017, pp. 490–495.
  15. Mengmeng Lu and Peng Liang. “Automatic classification of non-functional requirements from augmented app user reviews”. In: Proceedings of the 21st international conference on evaluation and assessment in software engineering. 2017, pp. 344–353.
  16. Nancy R Mead and Ted Stehney. “Security quality requirements engineering (SQUARE) methodology”. In: ACM SIGSOFT Software Engineering Notes 30.4 (2005), pp. 1–7.
  17. J Manuel Pérez-Verdejo et al. “Requirements and github issues: An automated approach for quality requirements classification”. In: Programming and Computer Software 47 (2021), pp. 704–721.
  18. Kiramat Rahman et al. “A deep learning framework for non-functional requirement classification”. In: Scientific Reports 14.1 (2024), p. 3216.
  19. Quentin Rouland, Stojanche Gjorcheski, and Jason Jaskolka. “Eliciting a security architecture requirements baseline from standards and regulations”. In: 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW). IEEE. 2023, pp. 224–229.
  20. Summra Saleem et al. “FNReq-Net: A hybrid computational framework for functional and non-functional requirements classification”. In: Journal of King Saud University-Computer and Information Sciences 35.8 (2023), p. 101665.
  21. Geet Sandhu, Shally Pal, and Pratap Pal. “Knowledge Extraction in Requirement Engineering with Machine Learning Perspective”. In: International Journal of Computer Applications 975 (2015), p. 8887.
  22. John Slankas and Laurie Williams. “Automated extraction of non-functional requirements in available documentation”. In: 2013 1st International workshop on natural language analysis in software engineering (NaturaLiSE). IEEE. 2013, pp. 9–16.
  23. John Viega. “Building security requirements with CLASP”. In: ACM SIGSOFT Software Engineering Notes 30.4 (2005), pp. 1–7.
  24. Simin Wang et al. “Machine/deep learning for software engineering: A systematic literature review”. In: IEEE Transactions on Software Engineering 49.3 (2022), pp. 1188–1231.