Security Assessment of Software Design using Neural Network
Journal Title: International Journal of Advanced Research in Artificial Intelligence(IJARAI) - Year 2012, Vol 1, Issue 4
Abstract
Security flaws in software applications today has been attributed mostly to design flaws. With limited budget and time to release software into the market, many developers often consider security as an afterthought. Previous research shows that integrating security into software applications at a later stage of software development lifecycle (SDLC) has been found to be more costly than when it is integrated during the early stages. To assist in the integration of security early in the SDLC stages, a new approach for assessing security during the design phase by neural network is investigated in this paper. Our findings show that by training a back propagation neural network to identify attack patterns, possible attacks can be identified from design scenarios presented to it. The result of performance of the neural network is presented in this paper.
Authors and Affiliations
A Adebiyi, Johnnes Arreymbi, Chris Imafidon
Hybrid Metaheuristics for the Unrelated Parallel Machine Scheduling to Minimize Makespan and Maximum Just-in-Time Deviations
This paper studies the unrelated parallel machine scheduling problem with three minimization objectives – makespan, maximum earliness, and maximum tardiness (MET-UPMSP). The last two objectives combined are related...
Comparison Between Linear and Nonlinear Models of Mixed Pixels in Remote Sensing Satellite Images Based on Cierniewski Surface BRDF Model by Means of Monte Carlo Ray Tracing Simulation
Comparative study on linear and nonlinear mixed pixel models of which pixels in remote sensing satellite images is composed with plural ground cover materials mixed together, is conducted for remote sensing satelli...
Method for Face Identification with Facial Action Coding System: FACS Based on Eigen Value Decomposion
Method for face identification based on eigen value decomposition together with tracing trajectories in the eigen space after the eigen value decomposition is proposed. The proposed method allows person to person differe...
Defending Grey Attacks by Exploiting Wavelet Analysis in Collaborative Filtering Recommender Systems
“Shilling” attacks or “profile injection” attacks have always major challenges in collaborative filtering recommender systems (CFRSs). Many efforts have been devoted to improve collaborative filtering techniques wh...
The Mobile Version of the Predicted Energy Efficient Bee-Inspired Routing (PEEBR)
In this paper, the previously proposed Predictive Energy Efficient Bee-inspired Routing (PEEBR) family of routing optimization algorithms based on the Artificial Bees Colony (ABC) Optimization model is extended fro...