Comparative analysis of impact of classification algorithms on security and performance bug reports

被引:0
|
作者
Said, Maryyam [2 ]
Bin Faiz, Rizwan [2 ]
Aljaidi, Mohammad [1 ]
Alshammari, Muteb [3 ]
机构
[1] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa 13116, Jordan
[2] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[3] Northern Border Univ, Fac Comp & Informat Technol, Dept Informat Technol, Rafha 91431, Saudi Arabia
关键词
bug classification; security bug; performance bug; text mining; bug prediction;
D O I
10.1515/jisys-2024-0045
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identification and classification of bugs, e.g., security and performance are a preemptive and fundamental practice which contributes to the development of secure and efficient software. Software Quality Assurance (SQA) needs to classify bugs into relevant categories, e.g., security and performance bugs since one type of bug may have a higher preference over another, thus facilitating software evolution and maintenance. In addition to classification, it would be ideal for the SQA manager to prioritize security and performance bugs based on the level of perseverance, severity, or impact to assign relevant developers whose expertise is aligned with the identification of such bugs, thus facilitating triaging. The aim of this research is to compare and analyze the prediction accuracy of machine learning algorithms, i.e., Artificial neural network (ANN), Support vector machine (SVM), Na & iuml;ve Bayes (NB), Decision tree (DT), Logistic regression (LR), and K-nearest neighbor (KNN) to identify security and performance bugs from the bug repository. We first label the existing dataset from the Bugzilla repository with the help of a software security expert to train the algorithms. Our research type is explanatory, and our research method is controlled experimentation, in which the independent variable is prediction accuracy and the dependent variables are ANN, SVM, NB, DT, LR, and KNN. First, we applied preprocessing, Term Frequency-Inverse Document Frequency feature extraction methods, and then applied classification algorithms. The results were measured through accuracy, precision, recall, and F-measure and then the results were compared and validated through the ten-fold cross-validation technique. Comparative analysis reveals that two algorithms (SVM and LR) perform better in terms of precision (0.99) for performance bugs and three algorithms (SVM, ANN, and LR) perform better in terms of F1 score for security bugs as compared to other classification algorithms which are essentially due to the linear dataset and extensive number of features in the dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Comparative analysis of CN2 rule induction with other classification algorithms for network security
    Kumar, Neeraj
    Kumar, Upendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) : 37119 - 37135
  • [22] Comparative analysis of CN2 rule induction with other classification algorithms for network security
    Neeraj Kumar
    Upendra Kumar
    Multimedia Tools and Applications, 2022, 81 : 37119 - 37135
  • [23] SOFTWARE MODULE CLASSIFICATION FOR COMMERCIAL BUG REPORTS
    Ozturk, Ceyhun E.
    Yilmaz, Eyup Halit
    Koksal, Omer
    Koc, Aykut
    2023 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW, 2023,
  • [24] A comparative analysis of classification algorithms for consumer credits
    Antal-Vaida, Claudia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2021, 15 (01): : 245 - 256
  • [25] Comparative Analysis of Classification Algorithms on Tactile Sensors
    Becari, Wesley
    Ruiz, Luana
    Evaristo, Bruno G. P.
    Ramirez-Fernandez, Francisco Javier
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS - 20TH IEEE ISCE, 2016, : 1 - 2
  • [26] A Comparative Analysis of Classification Algorithms on Diverse Datasets
    Alghobiri, Muhammad
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2018, 8 (02) : 2790 - 2795
  • [27] Automated Extraction of Security Concerns from Bug Reports
    Alqahtani, Sultan S.
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 327 - 329
  • [28] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [29] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844