An effective computational technique for taxonomic position of security vulnerability in software development

被引:6
|
作者
Srivastava, Amit Kumar [1 ]
Kumar, Shishir [1 ]
机构
[1] Jaypee Univ Engn & Technol, Guna 473226, India
关键词
Attack pattern; Principal component analysis; Data pre-processing; Normalization; Feed-forward back propagation; Multilayer perceptron; INTRUSION DETECTION; NEURAL-NETWORK; INFORMATION SECURITY; DESIGN; SYSTEMS; CLASSIFIER;
D O I
10.1016/j.jocs.2017.08.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An increasing demand of security standards in open networks and distributed computing environment has become a critical issue for automation of the business process workflow. At automation level, it is a challenging task to methodically analyze the security constraint during the composition of business process component. For the complete automation of business process, one must scrutinize the flow of security patterns, which consist of the bit value of the respective parameter, which is the key entity for identifying the security vulnerability. Various phase-wise security patterns have been used to identify the security vulnerabilities during the black/white box testing phase of the service development. In respect of automation in business logic, this article introduces a machine learning computational technique that classifies the possible types of phase-wise class categories of security vulnerability. The performance matrix along with comparative analysis suggests that the proposed approach proficiently matches the attack pattern to respective security pattern, which can classify phase-wise class categories of security vulnerability in software component development. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 50 条
  • [21] Security Responses in Software Development
    Lopez, Tamara
    Sharp, Helen
    Bandara, Arosha
    Tun, Thein
    Levine, Mark
    Nuseibeh, Bashar
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (03)
  • [22] An effective taint-based software vulnerability miner
    Liu, Zhi
    Zhang, Xiaosong
    Wu, Yue
    Chen, Ting
    COMPEL-THE INTERNATIONAL JOURNAL FOR COMPUTATION AND MATHEMATICS IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 32 (02) : 467 - 484
  • [23] The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks
    Algarni, Abdullah M.
    COMPUTERS, 2022, 11 (09)
  • [24] ReTEST: A Cost Effective Test Case Selection Technique for Modern Software Development
    Azizi, Maral
    Do, Hyunsook
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2018, : 144 - 154
  • [25] Advancing software security: DCodeBERT for automatic vulnerability detection and repair
    Bensaoud, Ahmed
    Kalita, Jugal
    Journal of Industrial Information Integration, 2025, 45
  • [26] Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools
    Parizi, Reza M.
    Qian, Kai
    Shahriar, Hossain
    Wu, Fan
    Tao, Lixin
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 825 - 826
  • [27] Software security evaluation using multilevel vulnerability discovery modeling
    Sharma, Ruchi
    Shrivastava, Avinash K.
    Hoang Pham
    QUALITY ENGINEERING, 2023, 35 (02) : 341 - 352
  • [28] Managing Software Security Risks through an Integrated Computational
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Nadeem, Mohd
    Faizan, Mohd
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (01): : 179 - 194
  • [29] Stealthy Code Obfuscation Technique for Software Security
    Darwish, Saad M.
    Guirguis, Shawkat K.
    Zalat, Mohamed S.
    ICCES'2010: THE 2010 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2010, : 93 - 99
  • [30] Security Assurance Model of Software Development for Global Software Development Vendors
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Alzahrani, Musaad
    Ilyas, Muhammad
    IEEE ACCESS, 2022, 10 : 58458 - 58487