Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams

Abstract

This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE) database. An interesting aim is to find out how we can make the secured software framework implementable in practice. In order to answer this question, some inquiries were set out regarding reference model and meta-process for classification to be a workable measurement system. The outputs of the process are the results discussion of experimental result and expert’s validation. The experimental result use the existing CVE database which serves as an analysis when a) the framework is applied on three mix datasets, and b) when the framework is applied on two focus datasets. The first explains the result when the framework is applied on the CVE data randomly which consist mix of vendors and the latter is applied on the CVE data randomly but on selective vendors. The metric used in this assessment are precision and recall rate. The result shows there is a strong indicator that the framework can produce acceptable output accuracy. Apart from that, several experts’ views were discussed to show the correctness and eliminate the ambiguity of classification rules and to prove the whole framework process.

Authors and Affiliations

Nor Hafeizah Hassan, Nazrulazhar Bahaman, Burairah Hussin, Shahrin Sahib

Keywords

Related Articles

Security Concerns in E-payment and the Law in Jordan

Recently communications and information technology became widely used in various aspects of life. The internet becomes the main network for information support. Using of internet enabled public and private organizations...

An Effective Approach to Analyze Algorithms with Linear O(n) Worst-Case Asymptotic Complexity

A theoretical approach of asymptote analyzes the algorithms for approximate time complexity. The worst-case asymptotic complexity classifies an algorithm to a certain class. The asymptotic complexity for algorithms retur...

Credibility Evaluation of Online Distance Education Websites

Web credibility is becoming a significant factor in increasing user satisfaction, trust, and loyalty. Web credibility is particularly important for people who cannot visit an institution for one reason or other and mostl...

Improving Throughput and Delay by Signaling Modification in Integrated 802.11 and 3G Heterogeneous Wireless Network

Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility ma...

Formal Analysis and Verification of Agent-Oriented Supply-Chain Management

Managing various relationships among the supply chain processes is known as Supply Chain Management (SCM). SCM is the oversight of finance, information and material as they move in the flow from different suppliers to ma...

Download PDF file
  • EP ID EP394019
  • DOI 10.14569/IJACSA.2018.090946
  • Views 108
  • Downloads 0

How To Cite

Nor Hafeizah Hassan, Nazrulazhar Bahaman, Burairah Hussin, Shahrin Sahib (2018). Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams. International Journal of Advanced Computer Science & Applications, 9(9), 352-364. https://europub.co.uk/articles/-A-394019