Applicability of neural networks to software security

Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary a...

Full description

Bibliographic Details
Main Author: Adebiyi, Adetunji B.
Published: University of East London 2013
Subjects:
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.578315
id ndltd-bl.uk-oai-ethos.bl.uk-578315
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-5783152019-01-15T03:18:26ZApplicability of neural networks to software securityAdebiyi, Adetunji B.2013Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. However, most of the current approaches used for evaluating software designs require the involvement of security experts because many software developers often lack the required expertise in making their software secure. In this research the current approaches used in integrating security at the design level is discussed and a new method of evaluating software design using neural network as evaluation tool is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. Also, with the proposed neural network tool this research found out that the identified attack patterns can be matched to security patterns that can provide mitigation to the threat in the attack pattern.005.8University of East London10.15123/PUB.3090https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.578315http://roar.uel.ac.uk/3090/Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 005.8
spellingShingle 005.8
Adebiyi, Adetunji B.
Applicability of neural networks to software security
description Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. However, most of the current approaches used for evaluating software designs require the involvement of security experts because many software developers often lack the required expertise in making their software secure. In this research the current approaches used in integrating security at the design level is discussed and a new method of evaluating software design using neural network as evaluation tool is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. Also, with the proposed neural network tool this research found out that the identified attack patterns can be matched to security patterns that can provide mitigation to the threat in the attack pattern.
author Adebiyi, Adetunji B.
author_facet Adebiyi, Adetunji B.
author_sort Adebiyi, Adetunji B.
title Applicability of neural networks to software security
title_short Applicability of neural networks to software security
title_full Applicability of neural networks to software security
title_fullStr Applicability of neural networks to software security
title_full_unstemmed Applicability of neural networks to software security
title_sort applicability of neural networks to software security
publisher University of East London
publishDate 2013
url https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.578315
work_keys_str_mv AT adebiyiadetunjib applicabilityofneuralnetworkstosoftwaresecurity
_version_ 1718813579109466112