Open Access iconOpen Access

ARTICLE

An Improved Hybrid Deep Learning Approach for Security Requirements Classification

Shoaib Hassan1,*, Qianmu Li1,*, Muhammad Zubair2, Rakan A. Alsowail3, Muhammad Umair2

1 School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, 210094, China
2 Faculty of Information Technology and Computer Science, University of Central Punjab, Lahore, 5400, Pakistan
3 Computer Skills, Self-Development Skills Development, Deanship of Common First Year, King Saud University, Riyadh, 11362, Saudia Arabia

* Corresponding Authors: Shoaib Hassan. Email: email; Qianmu Li. Email: email

Computers, Materials & Continua 2025, 82(3), 4041-4067. https://doi.org/10.32604/cmc.2025.059832

Abstract

As the trend to use the latest machine learning models to automate requirements engineering processes continues, security requirements classification is tuning into the most researched field in the software engineering community. Previous literature studies have proposed numerous models for the classification of security requirements. However, adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning algorithms. Moreover, most of the researchers focus only on the classification of requirements with security keywords. They did not consider other nonfunctional requirements (NFR) directly or indirectly related to security. This has been identified as a significant research gap in security requirements engineering. The major objective of this study is to propose a security requirements classification model that categorizes security and other relevant security requirements. We use PROMISE_exp and DOSSPRE, the two most commonly used datasets in the software engineering community. The proposed methodology consists of two steps. In the first step, we analyze all the nonfunctional requirements and their relation with security requirements. We found 10 NFRs that have a strong relationship with security requirements. In the second step, we categorize those NFRs in the security requirements category. Our proposed methodology is a hybrid model based on the Convolutional Neural Network (CNN) and Extreme Gradient Boosting (XGBoost) models. Moreover, we evaluate the model by updating the requirement type column with a binary classification column in the dataset to classify the requirements into security and non-security categories. The performance is evaluated using four metrics: recall, precision, accuracy, and F1 Score with 20 and 28 epochs number and batch size of 32 for PROMISE_exp and DOSSPRE datasets and achieved 87.3% and 85.3% accuracy, respectively. The proposed study shows an enhancement in metrics values compared to the previous literature studies. This is a proof of concept for systematizing the evaluation of security recognition in software systems during the early phases of software development.

Keywords

Requirements engineering; security requirements; deep learning; CNN; XGBoost; classification

Cite This Article

APA Style
Hassan, S., Li, Q., Zubair, M., Alsowail, R.A., Umair, M. (2025). An improved hybrid deep learning approach for security requirements classification. Computers, Materials & Continua, 82(3), 4041–4067. https://doi.org/10.32604/cmc.2025.059832
Vancouver Style
Hassan S, Li Q, Zubair M, Alsowail RA, Umair M. An improved hybrid deep learning approach for security requirements classification. Comput Mater Contin. 2025;82(3):4041–4067. https://doi.org/10.32604/cmc.2025.059832
IEEE Style
S. Hassan, Q. Li, M. Zubair, R. A. Alsowail, and M. Umair, “An Improved Hybrid Deep Learning Approach for Security Requirements Classification,” Comput. Mater. Contin., vol. 82, no. 3, pp. 4041–4067, 2025. https://doi.org/10.32604/cmc.2025.059832



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 462

    View

  • 274

    Download

  • 0

    Like

Share Link