Comparative analysis of impact of classification algorithms on security and performance bug reports

被引:0
|
作者
Said, Maryyam [2 ]
Bin Faiz, Rizwan [2 ]
Aljaidi, Mohammad [1 ]
Alshammari, Muteb [3 ]
机构
[1] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa 13116, Jordan
[2] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[3] Northern Border Univ, Fac Comp & Informat Technol, Dept Informat Technol, Rafha 91431, Saudi Arabia
关键词
bug classification; security bug; performance bug; text mining; bug prediction;
D O I
10.1515/jisys-2024-0045
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identification and classification of bugs, e.g., security and performance are a preemptive and fundamental practice which contributes to the development of secure and efficient software. Software Quality Assurance (SQA) needs to classify bugs into relevant categories, e.g., security and performance bugs since one type of bug may have a higher preference over another, thus facilitating software evolution and maintenance. In addition to classification, it would be ideal for the SQA manager to prioritize security and performance bugs based on the level of perseverance, severity, or impact to assign relevant developers whose expertise is aligned with the identification of such bugs, thus facilitating triaging. The aim of this research is to compare and analyze the prediction accuracy of machine learning algorithms, i.e., Artificial neural network (ANN), Support vector machine (SVM), Na & iuml;ve Bayes (NB), Decision tree (DT), Logistic regression (LR), and K-nearest neighbor (KNN) to identify security and performance bugs from the bug repository. We first label the existing dataset from the Bugzilla repository with the help of a software security expert to train the algorithms. Our research type is explanatory, and our research method is controlled experimentation, in which the independent variable is prediction accuracy and the dependent variables are ANN, SVM, NB, DT, LR, and KNN. First, we applied preprocessing, Term Frequency-Inverse Document Frequency feature extraction methods, and then applied classification algorithms. The results were measured through accuracy, precision, recall, and F-measure and then the results were compared and validated through the ten-fold cross-validation technique. Comparative analysis reveals that two algorithms (SVM and LR) perform better in terms of precision (0.99) for performance bugs and three algorithms (SVM, ANN, and LR) perform better in terms of F1 score for security bugs as compared to other classification algorithms which are essentially due to the linear dataset and extensive number of features in the dataset.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Performance Analysis of Security Algorithms for IoT devices
    Khan, Nuzhat
    Sakib, Nazmus
    Jerin, Ismot
    Quader, Shaela
    Chakrabarty, Amitabha
    2017 IEEE REGION 10 HUMANITARIAN TECHNOLOGY CONFERENCE (R10-HTC), 2017, : 130 - 133
  • [32] Performance Comparison of Bug Navigation Algorithms
    James Ng
    Thomas Bräunl
    Journal of Intelligent and Robotic Systems, 2007, 50 : 73 - 84
  • [33] Performance comparison of Bug navigation algorithms
    Ng, James
    Braeunl, Thomas
    JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2007, 50 (01) : 73 - 84
  • [34] A comparative study of bug algorithms for robot navigation
    McGuire, K. N.
    de Croon, G. C. H. E.
    Tuyls, K.
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2019, 121
  • [35] Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports
    Goseva-Popstojanova, Katerina
    Tyo, Jacob
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 152 - 163
  • [36] Analysis of Supervised Text Classification Algorithms on Corporate Sustainability Reports
    Shahi, Amir Mohammad
    Issac, Biju
    Modapothala, Jashua Rajesh
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 96 - 100
  • [37] A Novel Technique for Duplicate Detection and Classification of Bug Reports
    Zhang, Tao
    Lee, Byungjeong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07): : 1756 - 1768
  • [38] Guiding Bug Triage through Developer Analysis in Bug Reports
    Zhang, Tao
    Yang, Geunseok
    Lee, Byungjeong
    Chan, Alvin T. S.
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (03) : 405 - 431
  • [39] Sais: Self-Adaptive Identification of Security Bug Reports
    Mostafa, Shaikh
    Findley, Bridgette
    Meng, Na
    Wang, Xiaoyin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1779 - 1792
  • [40] Domain knowledge-based security bug reports prediction
    Zheng, Wei
    Cheng, JingYuan
    Wu, Xiaoxue
    Sun, Ruiyang
    Wang, Xiaolong
    Sun, Xiaobing
    KNOWLEDGE-BASED SYSTEMS, 2022, 241