An effective computational technique for taxonomic position of security vulnerability in software development

被引:6
|
作者
Srivastava, Amit Kumar [1 ]
Kumar, Shishir [1 ]
机构
[1] Jaypee Univ Engn & Technol, Guna 473226, India
关键词
Attack pattern; Principal component analysis; Data pre-processing; Normalization; Feed-forward back propagation; Multilayer perceptron; INTRUSION DETECTION; NEURAL-NETWORK; INFORMATION SECURITY; DESIGN; SYSTEMS; CLASSIFIER;
D O I
10.1016/j.jocs.2017.08.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An increasing demand of security standards in open networks and distributed computing environment has become a critical issue for automation of the business process workflow. At automation level, it is a challenging task to methodically analyze the security constraint during the composition of business process component. For the complete automation of business process, one must scrutinize the flow of security patterns, which consist of the bit value of the respective parameter, which is the key entity for identifying the security vulnerability. Various phase-wise security patterns have been used to identify the security vulnerabilities during the black/white box testing phase of the service development. In respect of automation in business logic, this article introduces a machine learning computational technique that classifies the possible types of phase-wise class categories of security vulnerability. The performance matrix along with comparative analysis suggests that the proposed approach proficiently matches the attack pattern to respective security pattern, which can classify phase-wise class categories of security vulnerability in software component development. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 50 条
  • [1] Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Almufareh, Maram Fahhad
    Khalil, Muhammad Ibrahim
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5039 - 5059
  • [2] Software Vulnerability and Application Security Risk
    Peng, Jianping
    Guo, Meiwen
    Quan, Jing
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2019, 32 (01) : 48 - 57
  • [3] On the Security of Security Software INVITED POSITION PAPER
    Muenther, Jan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 5 - 10
  • [4] Research on Software Security Vulnerability Detection Technology
    Liu Ping
    Su Jin
    Yang Xinfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1873 - 1876
  • [5] Security Vulnerability Assessment for Software Version Upgrade
    Treetippayaruk, Sirikwan
    Senivongse, Twittie
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 283 - 289
  • [6] Integrated software vulnerability and security functionality assessment
    Wang, Xiangrong
    Shi, Hang
    Huang, Tze-Yau William
    Lin, Frank C.
    ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2007, : 103 - +
  • [7] Software security; A vulnerability-activity revisit
    Hadavi, M. A.
    Sangchi, H. M.
    Hamishagi, V. S.
    Shirazi, H.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 866 - 872
  • [8] Software security vulnerability patterns based on ontology
    Hu, Xuan
    Chen, Junming
    Li, Haifeng
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (10): : 3084 - 3099
  • [9] Characterizing the 'security vulnerability likelihood' of software functions
    DaCosta, D
    Dahn, C
    Mancoridis, S
    Prevelakis, V
    INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2003, : 266 - 274
  • [10] Cost effective software engineering for security
    Johnson, D. Randolph
    FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 607 - 611