Analyzing and Assessing the Security-Related Defects

被引:0
|
作者
Bansal, Ankita [1 ]
Malhotra, Ruchika [2 ]
Raje, Kimaya [3 ]
机构
[1] Univ Delhi, Netaji Subhas Inst Technol, Dept Informat Technol, Delhi 110078, India
[2] Delhi Technol Univ, Dept Software Engn, Delhi 110042, India
[3] Carmel High Sch, 520 E Main St, Carmel, IN 46032 USA
关键词
Empirical Validation; Security- Related Defects; Security Vulnerabilities; Statistical Methods; Machine Learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and smooth functioning of the software. Thus, in this paper, we intend to study and analyze various aspects of security-related defects by analyzing the defect reports available in various open-source software repositories. Besides this, prediction models can also be constructed which can be used by researchers and practitioners to predict various aspects of security -related defects. Such prediction models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to the problem areas of the system under development. Thus, application of software prediction models in the early phases of the software life cycle contributes to efficient defect removal and results in delivering more reliable and better quality software products. Empirical studies lack the use of proper research methodology and thus result in reporting inconsistent results. This study will review the sequence of steps followed in the research process for carrying empirical and replicated studies. The steps include a) literature survey and definition of variables b) data collection c) report findings using statistical and machine learning techniques d) analyzing performance measures for evaluating the performance of the predicted models and e) interpretation of the obtained results for developing a software prediction model. These steps are explained with the help of experimental public domain data set. In addition, the paper provides an overview of repositories for mining software engineering data, tools for analyzing this data and various categories of machine learning methods. It also discusses existing research avenues and provides future research directions in this area.
引用
收藏
页码:21 / 25
页数:5
相关论文
共 50 条
  • [1] Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS
    Venson, Elaine
    Lam, Ting Fung
    Clark, Bradford
    Boehm, Barry
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 956 - 965
  • [2] Update on security-related lawsuits
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (06) : 430 - 431
  • [3] Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments
    Ntentos, Evangelos
    Zdun, Uwe
    Falazi, Ghareeb
    Breitenbuecher, Uwe
    Leymann, Frank
    2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 123 - 133
  • [4] Security-related policy and law in Japan
    Kiyotani, T
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) : 123 - 124
  • [5] Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-related Behavior: An Expectancy Theory Approach
    Burns, A. J.
    Roberts, Tom L.
    Posey, Clay
    Bennett, Rebecca J.
    Courtney, James F.
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 3930 - 3940
  • [6] Security views - Update on information security-related legislation
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (07) : 510 - 511
  • [7] Assessing Future Value of Investments in Security-Related IT Governance Control Objectives - Surveying IT Professionals
    Flores, Waldo Rocha
    Sommestad, Teodor
    Holm, Hannes
    Ekstedt, Mathias
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2011, : 393 - 402
  • [8] A Self-adaptive Approach for Assessing the Criticality of Security-Related Static Analysis Alerts
    Siavvas, Miltiadis
    Kalouptsoglou, Ilias
    Tsoukalas, Dimitrios
    Kehagias, Dionysios
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT VII, 2021, 12955 : 289 - 305
  • [9] Security-related Provisions in IPR Laws in India
    Gupta, V. K.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2007, 27 (04): : 5 - 14
  • [10] Information Security Maintenance Issues for Big Security-Related Data
    Miloslavskaya, Natalia
    Senatorov, Mikhail
    Tolstoy, Alexander
    Zapechnikov, Sergey
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 361 - 366