Analyzing and Assessing the Security-Related Defects

被引:0
|
作者
Bansal, Ankita [1 ]
Malhotra, Ruchika [2 ]
Raje, Kimaya [3 ]
机构
[1] Univ Delhi, Netaji Subhas Inst Technol, Dept Informat Technol, Delhi 110078, India
[2] Delhi Technol Univ, Dept Software Engn, Delhi 110042, India
[3] Carmel High Sch, 520 E Main St, Carmel, IN 46032 USA
关键词
Empirical Validation; Security- Related Defects; Security Vulnerabilities; Statistical Methods; Machine Learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and smooth functioning of the software. Thus, in this paper, we intend to study and analyze various aspects of security-related defects by analyzing the defect reports available in various open-source software repositories. Besides this, prediction models can also be constructed which can be used by researchers and practitioners to predict various aspects of security -related defects. Such prediction models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to the problem areas of the system under development. Thus, application of software prediction models in the early phases of the software life cycle contributes to efficient defect removal and results in delivering more reliable and better quality software products. Empirical studies lack the use of proper research methodology and thus result in reporting inconsistent results. This study will review the sequence of steps followed in the research process for carrying empirical and replicated studies. The steps include a) literature survey and definition of variables b) data collection c) report findings using statistical and machine learning techniques d) analyzing performance measures for evaluating the performance of the predicted models and e) interpretation of the obtained results for developing a software prediction model. These steps are explained with the help of experimental public domain data set. In addition, the paper provides an overview of repositories for mining software engineering data, tools for analyzing this data and various categories of machine learning methods. It also discusses existing research avenues and provides future research directions in this area.
引用
收藏
页码:21 / 25
页数:5
相关论文
共 50 条
  • [32] SECURITY-RELATED NARCO-THREATS TO DEMOCRACIES OF THE NORTHERN TRIANGLE
    Kos-Stanisic, Lidija
    POLITICKA MISAO-CROATIAN POLITICAL SCIENCE REVIEW, 2013, 50 (03): : 81 - 101
  • [33] Towards Safety and Security-Related Testing of Crisis Management Solutions
    Tagarev, Todor
    Ivanova, Petya
    Dubost, Laurent
    Dangerville, Cyril
    INFORMATION TECHNOLOGY IN DISASTER RISK REDUCTION, ITDRR 2020, 2021, 622 : 216 - 234
  • [34] Using multi-core to support security-related applications
    Zhou, Wanlei
    Xiang, Yang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2008, 5022 : 316 - +
  • [35] Security-related Commits in Open Source Web Browser Projects
    Kiss, Akos
    Hodovan, Renata
    2019 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2019), 2019, : 57 - 60
  • [36] Challenges to terahertz counter-terrorism and security-related applications
    Cummins, Howard
    TERAHERTZ FREQUENCY DETECTION AND IDENTIFICATION OF MATERIALS AND OBJECTS, 2007, : 205 - 224
  • [37] Security-related concerns with geographic information systems and geographic mapping
    Forcht, Karen A.
    Information Management and Computer Security, 2000, 8 (05): : 218 - 221
  • [38] The Transformation of the Levant Region: Security-Related Changes in a Turbulent Region
    Schmoll, Melanie Carina
    JOURNAL OF MILITARY AND STRATEGIC STUDIES, 2015, 16 (03): : 10 - 22
  • [39] Taxonomy of Security-related Issues in Android Apps: An Empirical Study
    Das, Teerath
    Ali, Adam
    Mikkonen, Tommi
    PROCEEDINGS OF THE 2024 WORKSHOP ON REPLICATIONS AND NEGATIVE RESULTS, RENE 2024, 2024, : 8 - 14
  • [40] Supplement of security-related parts of ISO/IEC TR 15504
    Kim, S
    Leem, C
    Kim, T
    Kim, J
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 1084 - 1089