An effective computational technique for taxonomic position of security vulnerability in software development

被引:6
|
作者
Srivastava, Amit Kumar [1 ]
Kumar, Shishir [1 ]
机构
[1] Jaypee Univ Engn & Technol, Guna 473226, India
关键词
Attack pattern; Principal component analysis; Data pre-processing; Normalization; Feed-forward back propagation; Multilayer perceptron; INTRUSION DETECTION; NEURAL-NETWORK; INFORMATION SECURITY; DESIGN; SYSTEMS; CLASSIFIER;
D O I
10.1016/j.jocs.2017.08.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An increasing demand of security standards in open networks and distributed computing environment has become a critical issue for automation of the business process workflow. At automation level, it is a challenging task to methodically analyze the security constraint during the composition of business process component. For the complete automation of business process, one must scrutinize the flow of security patterns, which consist of the bit value of the respective parameter, which is the key entity for identifying the security vulnerability. Various phase-wise security patterns have been used to identify the security vulnerabilities during the black/white box testing phase of the service development. In respect of automation in business logic, this article introduces a machine learning computational technique that classifies the possible types of phase-wise class categories of security vulnerability. The performance matrix along with comparative analysis suggests that the proposed approach proficiently matches the attack pattern to respective security pattern, which can classify phase-wise class categories of security vulnerability in software component development. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 50 条
  • [31] Economic Impact of Software Security Activities in Software Development
    Chehrazi, Golriz
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [32] Automating Vulnerability Management in the Software Development Lifecycle
    Franca, Horacio L.
    Teixeira, Cesar
    laranjeiro, Nuno
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 188 - 190
  • [33] A Cost-effective Approach to evaluating Security Vulnerability Scanner
    Tung, Yuan-Hsin
    Tseng, Shian-Shyong
    Shih, Jen-Feng
    Shan, Hwai-Ling
    2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [34] On Tools for Practical and Effective Security Policy Management and Vulnerability Scanning
    Urtamo, Ilkka
    Costin, Andrei
    BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2023, 2023, 483 : 375 - 382
  • [35] Development of thermal engineering computational software
    Inst of Aeronautical Materials, Beijing, China
    Cailiao Gongcheng, 5 (48-49):
  • [36] Human Aspects and Security in Software Development
    Staron, Miroslaw
    Abrahao, Silvia
    Penzenstaler, Birgit
    Serebrenik, Alexander
    IEEE SOFTWARE, 2024, 41 (04) : 171 - 174
  • [37] Integrating Security Concerns into Software Development
    Al-Fedaghi, Sabah
    Al-Kanderi, Fajer
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 235 - 247
  • [38] Integrating security and privacy in software development
    Gualo, Fernando
    Caballero, Ismael
    Rodriguez, Moises
    SOFTWARE QUALITY JOURNAL, 2020, 28 (03) : 1019 - 1042
  • [39] Security enforcement aware software development
    Vanoverberghe, Dries
    Piessens, Frank
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (07) : 1172 - 1185
  • [40] Integrating Application Security into Software Development
    Payne, Jeffery
    IT PROFESSIONAL, 2010, 12 (02) : 6 - 9