Analyzing and Assessing the Security-Related Defects

被引:0
|
作者
Bansal, Ankita [1 ]
Malhotra, Ruchika [2 ]
Raje, Kimaya [3 ]
机构
[1] Univ Delhi, Netaji Subhas Inst Technol, Dept Informat Technol, Delhi 110078, India
[2] Delhi Technol Univ, Dept Software Engn, Delhi 110042, India
[3] Carmel High Sch, 520 E Main St, Carmel, IN 46032 USA
关键词
Empirical Validation; Security- Related Defects; Security Vulnerabilities; Statistical Methods; Machine Learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and smooth functioning of the software. Thus, in this paper, we intend to study and analyze various aspects of security-related defects by analyzing the defect reports available in various open-source software repositories. Besides this, prediction models can also be constructed which can be used by researchers and practitioners to predict various aspects of security -related defects. Such prediction models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to the problem areas of the system under development. Thus, application of software prediction models in the early phases of the software life cycle contributes to efficient defect removal and results in delivering more reliable and better quality software products. Empirical studies lack the use of proper research methodology and thus result in reporting inconsistent results. This study will review the sequence of steps followed in the research process for carrying empirical and replicated studies. The steps include a) literature survey and definition of variables b) data collection c) report findings using statistical and machine learning techniques d) analyzing performance measures for evaluating the performance of the predicted models and e) interpretation of the obtained results for developing a software prediction model. These steps are explained with the help of experimental public domain data set. In addition, the paper provides an overview of repositories for mining software engineering data, tools for analyzing this data and various categories of machine learning methods. It also discusses existing research avenues and provides future research directions in this area.
引用
收藏
页码:21 / 25
页数:5
相关论文
共 50 条
  • [21] Characterization of Selected Security-related Standards in the Field of Security Requirements Engineering
    Fujs, Damjan
    Bernik, Igor
    Elektrotehniski Vestnik/Electrotechnical Review, 2022, 89 (03): : 73 - 80
  • [22] Automating Detection of Security-Related Software Engineering Failures
    Straub, Jeremy
    2019 IEEE AUTOTESTCON, 2019,
  • [23] Information security-related bills move through Congress
    不详
    COMPUTERS & SECURITY, 2006, 25 (02) : 87 - 87
  • [24] A Survey on Network Security-Related Data Collection Technologies
    Lin, Huaqing
    Yan, Zheng
    Chen, Yu
    Zhang, Lifang
    IEEE ACCESS, 2018, 6 : 18345 - 18365
  • [25] Security-related issues in peer-to-peer networks
    Divac-Krnic, L
    Ackermann, R
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 529 - 545
  • [26] Impact of Security-related Stress and Affective Distress on Information Security Policy Compliance
    Bao Quoc Duong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [27] Investigating the security-related challenges of blind users on the web
    Holman, J.
    Lazar, J.
    Feng, J.
    DESIGNING INCLUSIVE FUTURES, 2008, : 129 - 138
  • [28] Practical Static Analysis for Inference of Security-Related Program Properties
    Liu, Yin
    Milanova, Ana
    ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, 2009, : 50 - 59
  • [29] Empirical analysis of security-related code reviews in npm packages✩
    Alfadel, Mahmoud
    Nagy, Nicholas Alexandre
    Costa, Diego Elias
    Abdalkareem, Rabe
    Shihab, Emad
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 203
  • [30] Differences in the local perception of EULEX and KFOR in their security-related tasks
    Mahr, Ewa
    EUROPEAN SECURITY, 2021, 30 (01) : 43 - 64