[go: up one dir, main page]

skip to main content
research-article

APIRO: A Framework for Automated Security Tools API Recommendation

Published: 13 February 2023 Publication History

Abstract

Security Orchestration, Automation, and Response (SOAR) platforms integrate and orchestrate a wide variety of security tools to accelerate the operational activities of Security Operation Center (SOC). Integration of security tools in a SOAR platform is mostly done manually using APIs, plugins, and scripts. SOC teams need to navigate through API calls of different security tools to find a suitable API to define or update an incident response action. Analyzing various types of API documentation with diverse API format and presentation structure involves significant challenges such as data availability, data heterogeneity, and semantic variation for automatic identification of security tool APIs specific to a particular task. Given these challenges can have negative impact on SOC team’s ability to handle security incident effectively and efficiently, we consider it important to devise suitable automated support solutions to address these challenges. We propose a novel learning-based framework for automated security tool API Recommendation for security Orchestration, automation, and response, APIRO. To mitigate data availability constraint, APIRO enriches security tool API description by applying a wide variety of data augmentation techniques. To learn data heterogeneity of the security tools and semantic variation in API descriptions, APIRO consists of an API-specific word embedding model and a Convolutional Neural Network (CNN) model that are used for prediction of top three relevant APIs for a task. We experimentally demonstrate the effectiveness of APIRO in recommending APIs for different tasks using three security tools and 36 augmentation techniques. Our experimental results demonstrate the feasibility of APIRO for achieving 91.9% Top-1 Accuracy. Compared to the state-of-the-art baseline, APIRO is 26.93%, 23.03%, and 20.87% improved in terms of Top-1, Top-2, and Top-3 Accuracy and outperforms the baseline by 23.7% in terms of Mean Reciprocal Rank (MRR).

References

[1]
2019. NLTK: Categorizing and Tagging Words. Retrieved January 13, 2021 from https://www.nltk.org/book/ch05.html.
[2]
MISP. 2017. PyMISP - Python API. Retrieved from https://pymisp.readthedocs.io/en/latest/. Accessed March 3, 2021.
[3]
Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. 2016. You get where you’re looking for: The impact of information sources on code security. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 289–305.
[4]
Heike Adel and Hinrich Schütze. 2016. Exploring different dimensions of attention for uncertainty detection. arXiv:1612.06549. Retrieved from https://arxiv.org/abs/1612.06549.
[5]
Laura Bellamy, Michelle Carey, and Jenifer Schlotfeldt. 2011. DITA Best Practices: A Roadmap for Writing, Editing, and Architecting in DITA. IBM Press.
[6]
Yoshua Bengio. 2009. Learning Deep Architectures for AI. Now Publishers Inc.
[7]
Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2017. Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics 5 (2017), 135–146.
[8]
Cortex XSOAR by Palo Alto Networks. 2019. The State of Incident Response 2017. Retrieved from https://www.paloaltonetworks.com/resources/research/the-state-of-incident-response-2017. Accessed March 3, 2021.
[9]
C. Islam, M. A. Babar, and S. Nepal. 2019. An ontology-driven approach to automating the process of integrating security software systems. In Proceedings of the 2019 IEEE/ACM International Conference on Software and System Processes (ICSSP). IEEE, 54–63.
[10]
Liang Cai, Haoye Wang, Qiao Huang, Xin Xia, Zhenchang Xing, and David Lo. 2019. BIKER: a tool for Bi-information source based API method recommendation. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1075–1079.
[11]
Kaibo Cao, Chunyang Chen, Sebastian Baltes, Christoph Treude, and Xiang Chen. 2021. Automated query reformulation for efficient search based on query logs from stack overflow. In Proceedings of the 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, 1273–1285.
[12]
Wing-Kwan Chan, Hong Cheng, and David Lo. 2012. Searching connected API subgraph via text phrases. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. 1–11.
[13]
Chunyang Chen, Zhenchang Xing, and Yang Liu. 2017. By the community & for the community: A deep learning approach to assist collaborative editing in q&a sites. Proceedings of the ACM on Human–Computer Interaction 1, CSCW (2017), 1–21.
[14]
Qingying Chen and Minghui Zhou. 2018. A neural framework for retrieval and summarization of source code. In Proceedings of the 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 826–831.
[15]
François Chollet et al. 2015. Keras. Retrieved from https://github.com/fchollet/keras. Accessed March 3, 2021.
[16]
William G. Cochran. 2007. Sampling Techniques. John Wiley & Sons.
[17]
Threat Connect. 2019. SOAR Platforms: Everything You Need to Know About Security Orchestration, Automation, and Response. Retrieved from https://threatconnect.com/wp-content/uploads/ThreatConnect-SOAR-eBook.pdf. Accessed January 13, 2021.
[18]
Claude Coulombe. 2018. Text data augmentation made simple by leveraging NLP cloud APIs. arXiv:1812.04718. Retrieved from https://arxiv.org/abs/1812.04718.
[19]
Orange Cyber Defense. 2020. SOAR: Conclusions for 2020. Retrieved from https://orangecyberdefense.com/global/blog/managed-detection-response/soar-conclusions-for-2020/. March 3, 2021.
[20]
Andrea Di Sorbo, Sebastiano Panichella, Corrado A. Visaggio, Massimiliano Di Penta, Gerardo Canfora, and Harald C. Gall. 2015. Development emails content analyzer: Intention mining in developer discussions (T). In Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 12–23.
[21]
Marzieh Fadaee, Arianna Bisazza, and Christof Monz. 2017. Data augmentation for low-resource neural machine translation. arXiv:1705.00440. Retrieved from https://arxiv.org/abs/1705.00440.
[22]
Zhipeng Gao, Xin Xia, David Lo, and John Grundy. 2020. Technical Q&A site answer recommendation via question boosting. ACM Transactions on Software Engineering and Methodology (TOSEM) 30, 1 (2020), 1–34.
[23]
Xiaodong Gu, Hongyu Zhang, Dongmei Zhang, and Sunghun Kim. 2016. Deep API learning. In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 631–642.
[24]
Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In Proceedings of the 27th \(\lbrace\) USENIX \(\rbrace\) Security Symposium ( \(\lbrace\) USENIX \(\rbrace\) Security 18). 531–548.
[25]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735–1780.
[26]
Qiao Huang, Xin Xia, David Lo, and Gail C. Murphy. 2018. Automating intention mining. IEEE Transactions on Software Engineering 46, 10 (2018), 1098–1119.
[27]
Qiao Huang, Xin Xia, Zhenchang Xing, David Lo, and Xinyu Wang. 2018. API method recommendation without worrying about the task-API knowledge gap. In Proceedings of the 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 293–304.
[28]
Chadni Islam, M. Ali Babar, and Surya Nepal. 2019. Automated interpretation and integration of security tools using semantic knowledge. In Proceedings of the International Conference on Advanced Information Systems Engineering. Springer, 513–528.
[29]
Chadni Islam, Muhammad Ali Babar, and Surya Nepal. 2020. Architecture-centric support for integrating security tools in a security orchestration platform. In Proceedings of the European Conference on Software Architecture. Springer, 165–181.
[30]
ESG Jon Oltsik. July 2017. Cybersecurity Analytics and Operations in Transition: Challenges, Plans, Successes, and Strategies. Retrieved from https://www.esg-global.com/. Accessed March 3, 2021.
[31]
Rafael Kallis, Andrea Di Sorbo, Gerardo Canfora, and Sebastiano Panichella. 2021. Predicting issue types on GitHub. Science of Computer Programming 205 (2021), 102598.
[32]
Nyein Pyae Pyae Khin and Than Nwe Aung. 2015. Analyzing tagging accuracy of part-of-speech taggers. In Proceedings of the International Conference on Genetic and Evolutionary Computing. Springer, 347–354.
[33]
Hannah Kim and Young-Seob Jeong. 2019. Sentiment classification using convolutional neural networks. Applied Sciences 9, 11 (2019), 2347.
[34]
Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv:1408.5882. Retrieved from https://arxiv.org/abs/1408.5882.
[35]
Sosuke Kobayashi. 2018. Contextual augmentation: Data augmentation by words with paradigmatic relations. arXiv:1805.06201. Retrieved from https://arxiv.org/abs/1805.06201.
[36]
Siwei Lai, Liheng Xu, Kang Liu, and Jun Zhao. 2015. Recurrent convolutional neural networks for text classification. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 29.
[37]
Triet Huynh Minh Le, David Hin, Roland Croft, and M. Ali Babar. 2020. PUMiner: Mining security posts from developer question and answer websites with PU learning. In Proceedings of the 17th International Conference on Mining Software Repositories. 350–361.
[38]
Triet Huynh Minh Le, Bushra Sabir, and Muhammad Ali Babar. 2019. Automated software vulnerability assessment with concept drift. In Proceedings of the 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 371–382.
[39]
Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, and Ting Wang. 2020. Textshield: Robust text classification based on multimodal embedding and neural machine translation. In Proceedings of the 29th \(\lbrace\) USENIX \(\rbrace\) Security Symposium ( \(\lbrace\) USENIX \(\rbrace\) Security 20). 1381–1398.
[40]
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. Vuldeepecker: A deep learning-based system for vulnerability detection. arXiv:1801.01681. Retrieved from https://arxiv.org/abs/1801.01681.
[41]
Limacharlie. 2021. LimaCharlie REST API Documentation. Retrieved from https://api.limacharlie.io/static/swagger/#/. Accessed March 3, 2021.
[42]
Limacharlie. 2021. LimaCharlie Sensor Commands. Retrieved from https://doc.limacharlie.io/docs/documentation/docs/sensor_commands.md. Accessed March 3, 2021.
[43]
Limacharlie. 2021. Python-LimaCharlie API Documentation. Retrieved from https://python-limacharlie.readthedocs.io/en/master/limacharlie.html. Accessed March 3, 2021.
[44]
Bin Lin, Nathan Cassee, Alexander Serebrenik, Gabriele Bavota, Nicole Novielli, and Michele Lanza. 2022. Opinion mining for software development: A systematic literature review. ACM Transactions on Software Engineering and Methodology 31, 3 (2022), 1–41.
[45]
Chunyang Ling, Zeqi Lin, Yanzhen Zou, and Bing Xie. 2020. Adaptive deep code search. In Proceedings of the 28th International Conference on Program Comprehension. 48–59.
[46]
Meili Lu, Xiaobing Sun, Shaowei Wang, David Lo, and Yucong Duan. 2015. Query expansion via wordnet for effective code search. In Proceedings of the 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 545–549.
[47]
Edward Ma. 2019. NLP Augmentation. Retrieved from https://github.com/makcedward/nlpaug. Accessed March 3, 2021.
[48]
Parvaz Mahdabi, Mostafa Keikha, Shima Gerani, Monica Landoni, and Fabio Crestani. 2011. Building queries for prior-art search. In Proceedings of the Information Retrieval Facility Conference. Springer, 3–15.
[49]
Mary L. McHugh. 2012. Interrater reliability: The kappa statistic. Biochemia Medica 22, 3 (2012), 276–282.
[50]
Collin McMillan, Mark Grechanik, Denys Poshyvanyk, Qing Xie, and Chen Fu. 2011. Portfolio: Finding relevant functions and their usage. In Proceedings of the 33rd International Conference on Software Engineering. 111–120.
[51]
Michael Meng, Stephanie Steinhardt, and Andreas Schubert. 2018. Application programming interface documentation: What do software developers want? Journal of Technical Writing and Communication 48, 3 (2018), 295–330.
[52]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781. Retrieved from https://arxiv.org/abs/1301.3781.
[53]
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the Advances in Neural Information Processing Systems. 3111–3119.
[54]
MISP. 2021. MISP Automation API. Retrieved from https://www.circl.lu/doc/misp/automation/. Accessed March 3, 2021.
[55]
MISP. 2021. PyMISP - Python Library to Access MISP: Example Scripts. Retrieved from https://www.circl.lu/doc/misp/pymisp/. Accessed March 3, 2021.
[56]
Trong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, and Tien N. Nguyen. 2017. Exploring API embedding for API usages and applications. In Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). IEEE, 438–449.
[57]
Dillon Niederhut. 2020. Niacin: A Python package for text data enrichment. Journal of Open Source Software 5, 50 (2020), 2136.
[58]
Wiebke Wagner. 2010. Steven bird, ewan klein and edward loper: Natural language processing with python, analyzing text with the natural language toolkit. Language Resources and Evaluation 44, 4 (2010), 421–424.
[59]
David G. Novick and Karen Ward. 2006. Why don’t people read the manual? In Proceedings of the 24th Annual ACM International Conference on Design of Communication. 11–18.
[60]
Sebastiano Panichella, Andrea Di Sorbo, Emitza Guzman, Corrado A. Visaggio, Gerardo Canfora, and Harald C. Gall. 2015. How can i improve my app? Classifying user reviews for software maintenance and evolution. In Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 281–290.
[61]
Chris Parnin, Christoph Treude, Lars Grammel, and Margaret-Anne Storey. 2012. Crowd documentation: Exploring the coverage and the dynamics of API discussions on Stack Overflow. Georgia Institute of Technology, Tech. Rep 11 (2012).
[62]
Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. GloVe: Global vectors for word representation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). 1532–1543.
[63]
Splunk Phantom. 2021. Splunk Phantom: Harness the Full Power of Your Security Investments with Security Orchestration, Automation and Response. Retrieved from https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation/features.html. Accessed March 3, 2021.
[64]
Lutz Prechelt. 1998. Early stopping-but when? In Proceedings of the Neural Networks: Tricks of the Trade. Springer, 55–69.
[65]
Siyuan Qiu, Binxia Xu, Jie Zhang, Yafang Wang, Xiaoyu Shen, Gerard de Melo, Chong Long, and Xiaolong Li. 2020. EasyAug: An automatic textual data augmentation platform for classification tasks. In Proceedings of the Companion Proceedings of the Web Conference 2020. 249–252.
[66]
Mukund Raghothaman, Yi Wei, and Youssef Hamadi. 2016. Swim: Synthesizing what i mean-code search and idiomatic snippet synthesis. In Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 357–367.
[67]
Mohammad Masudur Rahman, Chanchal K. Roy, and David Lo. 2016. Rack: Automatic api recommendation using crowdsourced knowledge. In Proceedings of the 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Vol. 1. IEEE, 349–359.
[68]
Rapid7. 2020. Security Orchestration and Automation (SOAR) Playbook: Your Practical Guide to Implementing a SOAR Solution. Retrieved from https://www.rapid7.com/info/security-orchestration-and-automation-playbook/. Accessed March 3, 2021.
[69]
Radim Řehůřek and Petr Sojka. 2010. Software framework for topic modelling with large corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45–50.
[70]
Buddy Rikard. 2019, Accessed March 3, 2021. Threat Connect- Playbook Fridays: How to Create a Playbook for the Non-Programmer. Retrieved from https://threatconnect.com/blog/playbooks-for-non-programmers/.
[71]
Anthony Rios and Ramakanth Kavuluru. 2015. Convolutional neural networks for biomedical text classification: Application in indexing biomedical articles. In Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics. 258–267.
[72]
Hillary Sanders and Joshua Saxe. 2017. Garbage in, garbage out: How purport-edly great ML models can be screwed up by bad data. Proceedings of Blackhat 2017 (2017).
[73]
Mike Schuster and Kuldip K. Paliwal. 1997. Bidirectional recurrent neural networks. IEEE Transactions on Signal Processing 45, 11 (1997), 2673–2681.
[74]
D3 Security. 2021. ENTERPRISE INCIDENT & CASE MANAGEMENT SOLUTION FOR SECURITY ORCHESTRATION, AUTOMATION, & RESPONSE. Retrieved from https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE36vyb. Accessed March 3, 2021.
[75]
SNORT. 2020. Running Snort as a Daemon. Retrieved from http://manual-snort-org.s3-website-us-east-1.amazonaws.com/node11.html. Accessed March 3, 2021.
[76]
SNORT. 2020. SNORT Users Manual 2.9.16. Retrieved from http://manual-snort-org.s3-website-us-east-1.amazonaws.com/. Accessed March 3, 2021.
[77]
Mingcong Song, Yang Hu, Huixiang Chen, and Tao Li. 2017. Towards pervasive and user satisfactory cnn across gpu microarchitectures. In Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 1–12.
[78]
Daniel Strigl, Klaus Kofler, and Stefan Podlipnig. 2010. Performance and scalability of GPU-based convolutional neural networks. In Proceedings of the 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing. IEEE, 317–324.
[79]
Chi Sun, Xipeng Qiu, Yige Xu, and Xuanjing Huang. 2019. How to fine-tune BERT for text classification? In Proceedings of the China National Conference on Chinese Computational Linguistics. Springer, 194–206.
[80]
Swimlane. 2021. Security Orchestration, Automation and Response (SOAR) Capabilities. Retrieved from https://swimlane.com/assets/uploads/documents/SOAR_Capabilities_e_book___Swimlane.pdf.
[81]
TensorFlow. 2021. Sparse_categorical_crossentropy. Retrieved from https://www.tensorflow.org/api_docs/python/tf/keras/losses/sparse_categorical_crossentropy. Accessed January 27, 2021.
[82]
Yuan Tian, Ferdian Thung, Abhishek Sharma, and David Lo. 2017. APIBot: Question answering bot for API documentation. In Proceedings of the 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 153–158.
[83]
S. Tiun, U. A. Mokhtar, S. H. Bakar, and S. Saad. 2020. Classification of functional and non-functional requirement in software requirement using Word2vec and fast Text. In Proceedings of the Journal of Physics: Conference Series, Vol. 1529. IOP Publishing, 042077.
[84]
Princeton University. 2010. Princeton University “About WordNet”. Retrieved from https://wordnet.princeton.edu/. January 13, 2021.
[85]
Bertie Vidgen and Leon Derczynski. 2020. Directions in abusive language training data, a systematic review: Garbage in, garbage out. PloS One 15, 12 (2020), e0243300.
[86]
Manfred Vielberth, Fabian Böhm, Ines Fichtinger, and Günther Pernul. 2020. Security operations center: A systematic study and open challenges. IEEE Access 8 (2020), 227756–227779.
[87]
Shaohua Wang, NhatHai Phan, Yan Wang, and Yong Zhao. 2019. Extracting API tips from developer question and answer websites. In Proceedings of the 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR). IEEE, 321–332.
[88]
Jason Wei and Kai Zou. 2019. Eda: Easy data augmentation techniques for boosting performance on text classification tasks. arXiv:1901.11196. Retrieved from https://arxiv.org/abs/1901.11196.
[89]
Ying Wen, Weinan Zhang, Rui Luo, and Jun Wang. 2016. Learning text representation using recurrent convolutional neural network with highway layers. arXiv:1606.06905. Retrieved from https://arxiv.org/abs/1606.06905.
[90]
Di Wu, Xiao-Yuan Jing, Hongyu Zhang, Xiaohui Kong, Yu Xie, and Zhiguo Huang. 2020. Data-driven approach to application programming interface documentation mining: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 10, 5 (2020), e1369.
[91]
Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, and Wenyun Zhao. 2020. API method recommendation via explicit matching of functionality verb phrases. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1015–1026.
[92]
Congying Xu, Xiaobing Sun, Bin Li, Xintong Lu, and Hongjing Guo. 2018. MULAPI: Improving API method recommendation with API usage location. Journal of Systems and Software 142 (2018), 195–205.
[93]
Xin Ye, Hui Shen, Xiao Ma, Razvan Bunescu, and Chang Liu. 2016. From word embeddings to document similarities for improved information retrieval in software engineering. In Proceedings of the 38th International Conference on Software Engineering. 404–415.
[94]
Promod Yenigalla, Sibsambhu Kar, Chirag Singh, Ajay Nagar, and Gaurav Mathur. 2018. Addressing unseen word problem in text classification. In Proceedings of the International Conference on Applications of Natural Language to Information Systems. Springer, 339–351.
[95]
Semih Yumusak, Erdogan Dogdu, and Halife Kodaz. 2014. Tagging accuracy analysis on part-of-speech taggers. Journal of Computer and Communications 2, 4 (2014), 157–162.
[96]
Xiang Zhang, Junbo Zhao, and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Proceedings of the Advances in Neural Information Processing Systems. 649–657.
[97]
Hao Zhong, Lu Zhang, Tao Xie, and Hong Mei. 2009. Inferring resource specifications from natural language API documentation. In Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering. IEEE, 307–318.
[98]
Peng Zhou, Zhenyu Qi, Suncong Zheng, Jiaming Xu, Hongyun Bao, and Bo Xu. 2016. Text classification improved by integrating bidirectional LSTM with two-dimensional max pooling. arXiv:1611.06639. Retrieved from https://arxiv.org/abs/1611.06639.

Cited By

View all
  • (2024)Humans and Automation: Augmenting Security Operation CentersJournal of Cybersecurity and Privacy10.3390/jcp40300204:3(388-409)Online publication date: 1-Jul-2024
  • (2024)Harnessing Test-Oriented Knowledge Graphs for Enhanced Test Function RecommendationElectronics10.3390/electronics1308154713:8(1547)Online publication date: 18-Apr-2024
  • (2024)Automation Bias and Complacency in Security Operation CentersComputers10.3390/computers1307016513:7(165)Online publication date: 3-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Software Engineering and Methodology
ACM Transactions on Software Engineering and Methodology  Volume 32, Issue 1
January 2023
954 pages
ISSN:1049-331X
EISSN:1557-7392
DOI:10.1145/3572890
  • Editor:
  • Mauro Pezzè
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 February 2023
Online AM: 31 March 2022
Accepted: 19 January 2022
Revised: 14 December 2021
Received: 27 May 2021
Published in TOSEM Volume 32, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Security Orchestration
  2. Incident Response Plan
  3. security tool API
  4. Security Operation Center
  5. API Recommendation
  6. SOAR

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • Australian Government’s Cooperative Research Centres Programme
  • super-computing resources provided by the Phoenix HPC service at the University of Adelaide

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)515
  • Downloads (Last 6 weeks)32
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Humans and Automation: Augmenting Security Operation CentersJournal of Cybersecurity and Privacy10.3390/jcp40300204:3(388-409)Online publication date: 1-Jul-2024
  • (2024)Harnessing Test-Oriented Knowledge Graphs for Enhanced Test Function RecommendationElectronics10.3390/electronics1308154713:8(1547)Online publication date: 18-Apr-2024
  • (2024)Automation Bias and Complacency in Security Operation CentersComputers10.3390/computers1307016513:7(165)Online publication date: 3-Jul-2024
  • (2024)AI4SOAR: A Security Intelligence Tool for Automated Incident ResponseProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670450(1-8)Online publication date: 30-Jul-2024
  • (2024)Design and Generation of a Set of Declarative APIs for Security OrchestrationIEEE Transactions on Services Computing10.1109/TSC.2023.333666617:1(127-141)Online publication date: Jan-2024
  • (2024)The future of API analyticsAutomated Software Engineering10.1007/s10515-024-00442-z31:2Online publication date: 9-Jun-2024
  • (2024)Machine Learning-Based Detection of API Security AttacksData Science and Applications10.1007/978-981-99-7814-4_23(285-297)Online publication date: 25-Feb-2024
  • (2023)Sentiment Analysis of ChatGPT Tweets Using Machine Learning Techniques2023 9th International Conference on Optimization and Applications (ICOA)10.1109/ICOA58279.2023.10308835(1-5)Online publication date: 5-Oct-2023
  • (2023)A Deep Graph Convolutional Network based Web API Classification Approach for Mashup Creation2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00044(265-272)Online publication date: 17-Dec-2023
  • (2023)Methodology for Cyber Threat Intelligence with Sensor IntegrationCSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)10.1007/978-3-031-30592-4_2(14-28)Online publication date: 1-May-2023

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media