Enhancing the secured software framework using vulnerability patterns and flow diagrams
This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured softwar...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
The Science And Information (SAI) Organization Limited
2018
|
Online Access: | http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF http://eprints.utem.edu.my/id/eprint/24789/ https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |
id |
my.utem.eprints.24789 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.247892023-06-28T15:14:35Z http://eprints.utem.edu.my/id/eprint/24789/ Enhancing the secured software framework using vulnerability patterns and flow diagrams Hassan, Nor Hafeizah Bahaman, Nazrulazhar Hussin, Burairah Sahib, Shahrin This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured software framework implementable in practice. In order to answer this question, some inquiries were set out regarding reference model and meta-process for classification to be a workable measurement system. The outputs of the process are the results discussion of experimental result and expert's validation. The experimental result use the existing CVE database which serves as an analysis when a) the framework is applied on three mix datasets, and b) when the framework is applied on two focus datasets. The first explains the result when the framework is applied on the CVE data randomly which consist mix of vendors and the latter is applied on the CVE data randomly but on selective vendors. The metric used in this assessment are precision and recall rate. The result shows there is a strong indicator that the framework can produce acceptable output accuracy. Apart from that, several experts' views were discussed to show the correctness and eliminate the ambiguity of classification rules and to prove the whole framework process. The Science And Information (SAI) Organization Limited 2018 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF Hassan, Nor Hafeizah and Bahaman, Nazrulazhar and Hussin, Burairah and Sahib, Shahrin (2018) Enhancing the secured software framework using vulnerability patterns and flow diagrams. International Journal Of Advanced Computer Science And Applications (IJASCA), 9 (9). 352 - 364. ISSN 2158-107X https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf 10.14569/ijacsa.2018.090946 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured software framework implementable in practice. In order to answer this question, some inquiries were set out regarding reference model and meta-process for classification to be a workable measurement system. The outputs of the process are the results discussion of experimental result and expert's validation. The experimental result use the existing CVE database which serves as an analysis when a) the framework is applied on three mix datasets, and b) when the framework is applied on two focus datasets. The first explains the result when the framework is applied on the CVE data randomly which consist mix of vendors and the latter is applied on the CVE data randomly but on selective vendors. The metric used in this assessment are precision and recall rate. The result shows there is a strong indicator that the framework can produce acceptable output accuracy. Apart from that, several experts' views were discussed to show the correctness and eliminate the ambiguity of classification rules and to prove the whole framework process. |
format |
Article |
author |
Hassan, Nor Hafeizah Bahaman, Nazrulazhar Hussin, Burairah Sahib, Shahrin |
spellingShingle |
Hassan, Nor Hafeizah Bahaman, Nazrulazhar Hussin, Burairah Sahib, Shahrin Enhancing the secured software framework using vulnerability patterns and flow diagrams |
author_facet |
Hassan, Nor Hafeizah Bahaman, Nazrulazhar Hussin, Burairah Sahib, Shahrin |
author_sort |
Hassan, Nor Hafeizah |
title |
Enhancing the secured software framework using vulnerability patterns and flow diagrams |
title_short |
Enhancing the secured software framework using vulnerability patterns and flow diagrams |
title_full |
Enhancing the secured software framework using vulnerability patterns and flow diagrams |
title_fullStr |
Enhancing the secured software framework using vulnerability patterns and flow diagrams |
title_full_unstemmed |
Enhancing the secured software framework using vulnerability patterns and flow diagrams |
title_sort |
enhancing the secured software framework using vulnerability patterns and flow diagrams |
publisher |
The Science And Information (SAI) Organization Limited |
publishDate |
2018 |
url |
http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF http://eprints.utem.edu.my/id/eprint/24789/ https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf |
_version_ |
1770555169732296704 |