An effective computational technique for taxonomic position of security vulnerability in software development

被引:6
|
作者
Srivastava, Amit Kumar [1 ]
Kumar, Shishir [1 ]
机构
[1] Jaypee Univ Engn & Technol, Guna 473226, India
关键词
Attack pattern; Principal component analysis; Data pre-processing; Normalization; Feed-forward back propagation; Multilayer perceptron; INTRUSION DETECTION; NEURAL-NETWORK; INFORMATION SECURITY; DESIGN; SYSTEMS; CLASSIFIER;
D O I
10.1016/j.jocs.2017.08.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An increasing demand of security standards in open networks and distributed computing environment has become a critical issue for automation of the business process workflow. At automation level, it is a challenging task to methodically analyze the security constraint during the composition of business process component. For the complete automation of business process, one must scrutinize the flow of security patterns, which consist of the bit value of the respective parameter, which is the key entity for identifying the security vulnerability. Various phase-wise security patterns have been used to identify the security vulnerabilities during the black/white box testing phase of the service development. In respect of automation in business logic, this article introduces a machine learning computational technique that classifies the possible types of phase-wise class categories of security vulnerability. The performance matrix along with comparative analysis suggests that the proposed approach proficiently matches the attack pattern to respective security pattern, which can classify phase-wise class categories of security vulnerability in software component development. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 50 条
  • [41] Integrating security concerns into software development
    Al-Fedaghi, S. (sabah@alfedaghi.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [42] SECURITY SENSITIVE SOFTWARE-DEVELOPMENT
    RESSLER, MP
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 89 - 91
  • [43] Strong security starts with software development
    Cope R.
    Network Security, 2020, 2020 (07) : 6 - 9
  • [44] Incorporating Security into Software Development Process
    Yoshioka, R.
    Watanobe, Y.
    Mirenkov, N.
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 99 - 109
  • [45] Software development and related security issues
    Zadeh, Jeff
    DeVolder, Dennis
    PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 746 - +
  • [46] Security Practices in Agile Software Development
    Selva-Mora, Alejandra
    Quesada-Lopez, Christian
    PROCEEDINGS 2024 IEEE/ACM INTERNATIONAL WORKSHOP ON SOFTWARE-INTENSIVE BUSINESS, IWSIB 2024, 2024, : 56 - 63
  • [47] A Security Ontology with MDA for Software Development
    Kang, Wentao
    Liang, Ying
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 67 - 74
  • [48] Inconsistent measurement and incorrect detection of software names in security vulnerability reports
    Sun, Hongyu
    Ou, Guoliang
    Zheng, Ziqiu
    Liao, Lei
    Wang, He
    Zhang, Yuqing
    COMPUTERS & SECURITY, 2023, 135
  • [49] Improving Vulnerability Detection Measurement [Test Suites and Software Security Assurance]
    Hoole, Alexander M.
    Traore, Issa
    Delaitre, Aurelien
    de Oliveira, Charles
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING 2016 (EASE '16), 2016,
  • [50] An effective computational technique for dynamic reanalysis of structures
    Chan, HC
    Liu, JK
    ADVANCES IN COMPUTATIONAL STRUCTURAL MECHANICS, 1998, : 117 - 121