Analyzing and Assessing the Security-Related Defects

被引:0
|
作者
Bansal, Ankita [1 ]
Malhotra, Ruchika [2 ]
Raje, Kimaya [3 ]
机构
[1] Univ Delhi, Netaji Subhas Inst Technol, Dept Informat Technol, Delhi 110078, India
[2] Delhi Technol Univ, Dept Software Engn, Delhi 110042, India
[3] Carmel High Sch, 520 E Main St, Carmel, IN 46032 USA
关键词
Empirical Validation; Security- Related Defects; Security Vulnerabilities; Statistical Methods; Machine Learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and smooth functioning of the software. Thus, in this paper, we intend to study and analyze various aspects of security-related defects by analyzing the defect reports available in various open-source software repositories. Besides this, prediction models can also be constructed which can be used by researchers and practitioners to predict various aspects of security -related defects. Such prediction models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to the problem areas of the system under development. Thus, application of software prediction models in the early phases of the software life cycle contributes to efficient defect removal and results in delivering more reliable and better quality software products. Empirical studies lack the use of proper research methodology and thus result in reporting inconsistent results. This study will review the sequence of steps followed in the research process for carrying empirical and replicated studies. The steps include a) literature survey and definition of variables b) data collection c) report findings using statistical and machine learning techniques d) analyzing performance measures for evaluating the performance of the predicted models and e) interpretation of the obtained results for developing a software prediction model. These steps are explained with the help of experimental public domain data set. In addition, the paper provides an overview of repositories for mining software engineering data, tools for analyzing this data and various categories of machine learning methods. It also discusses existing research avenues and provides future research directions in this area.
引用
收藏
页码:21 / 25
页数:5
相关论文
共 50 条
  • [41] Eyes wide open: The role of situational information security awareness for security-related behaviour
    Jaeger, Lennart
    Eckhardt, Andreas
    INFORMATION SYSTEMS JOURNAL, 2021, 31 (03) : 429 - 472
  • [42] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 224 - 228
  • [43] Analysis of physical and cyber security-related events in the chemical and process industry
    Moreno, Valeria Casson
    Reniers, Genserik
    Salzano, Ernesto
    Cozzani, Valerio
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2018, 116 : 621 - 631
  • [44] Security-related design patterns for intelligent sensors requiring measurable assurance
    Bialas, Andrzej
    PRZEGLAD ELEKTROTECHNICZNY, 2009, 85 (07): : 92 - 99
  • [45] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (02) : 454 - 455
  • [46] A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust
    Peikari, Hamid Reza
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 139 - 148
  • [47] Foodscape: A scoping review and a research agenda for food security-related studies
    Vonthron, Simon
    Perrin, Coline
    Soulard, Christophe-Toussaint
    PLOS ONE, 2020, 15 (05):
  • [48] Protecting private security-related information from disclosure by government agencies
    Conrad, JW
    ADMINISTRATIVE LAW REVIEW, 2005, 57 (03) : 715 - 755
  • [49] 2000-2009: A Decade of Security-Related Developments in Trade and Investment
    Hsu, Locknie
    JOURNAL OF WORLD INVESTMENT & TRADE, 2010, 11 (05): : 697 - 729
  • [50] Learning to Identify Security-Related Issues Using Convolutional Neural Networks
    Palacio, David N.
    McCrystal, Daniel
    Moran, Kevin
    Bernal-Cardenas, Carlos
    Poshyvanyk, Denys
    Shenefiel, Chris
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 140 - 144