Enhancing the secured software framework using vulnerability patterns and flow diagrams

This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured softwar...

Full description

Saved in:
Bibliographic Details
Main Authors: Hassan, Nor Hafeizah, Bahaman, Nazrulazhar, Hussin, Burairah, Sahib, Shahrin
Format: Article
Language:English
Published: The Science And Information (SAI) Organization Limited 2018
Online Access:http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF
http://eprints.utem.edu.my/id/eprint/24789/
https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.24789
record_format eprints
spelling my.utem.eprints.247892023-06-28T15:14:35Z http://eprints.utem.edu.my/id/eprint/24789/ Enhancing the secured software framework using vulnerability patterns and flow diagrams Hassan, Nor Hafeizah Bahaman, Nazrulazhar Hussin, Burairah Sahib, Shahrin This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured software framework implementable in practice. In order to answer this question, some inquiries were set out regarding reference model and meta-process for classification to be a workable measurement system. The outputs of the process are the results discussion of experimental result and expert's validation. The experimental result use the existing CVE database which serves as an analysis when a) the framework is applied on three mix datasets, and b) when the framework is applied on two focus datasets. The first explains the result when the framework is applied on the CVE data randomly which consist mix of vendors and the latter is applied on the CVE data randomly but on selective vendors. The metric used in this assessment are precision and recall rate. The result shows there is a strong indicator that the framework can produce acceptable output accuracy. Apart from that, several experts' views were discussed to show the correctness and eliminate the ambiguity of classification rules and to prove the whole framework process. The Science And Information (SAI) Organization Limited 2018 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF Hassan, Nor Hafeizah and Bahaman, Nazrulazhar and Hussin, Burairah and Sahib, Shahrin (2018) Enhancing the secured software framework using vulnerability patterns and flow diagrams. International Journal Of Advanced Computer Science And Applications (IJASCA), 9 (9). 352 - 364. ISSN 2158-107X https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf 10.14569/ijacsa.2018.090946
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured software framework implementable in practice. In order to answer this question, some inquiries were set out regarding reference model and meta-process for classification to be a workable measurement system. The outputs of the process are the results discussion of experimental result and expert's validation. The experimental result use the existing CVE database which serves as an analysis when a) the framework is applied on three mix datasets, and b) when the framework is applied on two focus datasets. The first explains the result when the framework is applied on the CVE data randomly which consist mix of vendors and the latter is applied on the CVE data randomly but on selective vendors. The metric used in this assessment are precision and recall rate. The result shows there is a strong indicator that the framework can produce acceptable output accuracy. Apart from that, several experts' views were discussed to show the correctness and eliminate the ambiguity of classification rules and to prove the whole framework process.
format Article
author Hassan, Nor Hafeizah
Bahaman, Nazrulazhar
Hussin, Burairah
Sahib, Shahrin
spellingShingle Hassan, Nor Hafeizah
Bahaman, Nazrulazhar
Hussin, Burairah
Sahib, Shahrin
Enhancing the secured software framework using vulnerability patterns and flow diagrams
author_facet Hassan, Nor Hafeizah
Bahaman, Nazrulazhar
Hussin, Burairah
Sahib, Shahrin
author_sort Hassan, Nor Hafeizah
title Enhancing the secured software framework using vulnerability patterns and flow diagrams
title_short Enhancing the secured software framework using vulnerability patterns and flow diagrams
title_full Enhancing the secured software framework using vulnerability patterns and flow diagrams
title_fullStr Enhancing the secured software framework using vulnerability patterns and flow diagrams
title_full_unstemmed Enhancing the secured software framework using vulnerability patterns and flow diagrams
title_sort enhancing the secured software framework using vulnerability patterns and flow diagrams
publisher The Science And Information (SAI) Organization Limited
publishDate 2018
url http://eprints.utem.edu.my/id/eprint/24789/2/ENHANCING%20THE%20SECURED%20SOFTWARE%20FRAMEWORK%20USING%20VULNERABILITY%20PATTERNS%20AND%20FLOW%20DIAGRAMS.PDF
http://eprints.utem.edu.my/id/eprint/24789/
https://thesai.org/Downloads/Volume9No9/Paper_46-Enhancing_the_Secured_Software_Framework.pdf
_version_ 1770555169732296704