Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for software products from individuals as well as the organizations...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-04-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/12/4/598 |
id |
doaj-8591e535ee1942a4bb3287a1b2a9531b |
---|---|
record_format |
Article |
spelling |
doaj-8591e535ee1942a4bb3287a1b2a9531b2020-11-25T02:33:57ZengMDPI AGSymmetry2073-89942020-04-011259859810.3390/sym12040598Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics PerspectiveAlka Agrawal0Adil Hussain Seh1Abdullah Baz2Hosam Alhakami3Wajdi Alhakami4Mohammed Baz5Rajeev Kumar6Raees Ahmad Khan7Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, IndiaDepartment of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, IndiaDepartment of Computer Engineering, College of Computer and Information Systems, Umm Al-Qura University, Makkah 715, Saudi ArabiaDepartment of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 715, Saudi ArabiaDepartment of Information Technology, College of Computers and Information Technology, Taif University, Taif 26571, Saudi ArabiaComputer Engineering Department, College of Computers and Information Technology, Taif University, Taif 26571, Saudi ArabiaDepartment of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, IndiaDepartment of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, IndiaIncreasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for software products from individuals as well as the organizations is in itself a big challenge for the designers and developers. Meanwhile, adopting traditional and informal learnings to address security issues of software products has made it easier for cyber-criminals to expose software vulnerabilities. Hence, it is imperative for the security practitioners to employ a symmetric mechanism so as to achieve the desired level of software security. In this context, a decision-making approach is the most symmetrical technique to assess the security of software in security tactics perspective. Since the security tactics directly address the quality attribute concerns, this symmetric approach will be highly effective in making the software systems more secure. In this study, the authors have selected three main attributes and fifteen sub-attributes at level 1 and level 2, respectively, with ten different software of an institute as alternatives. Furthermore, this study uses a fuzzy-based symmetrical decision-making approach to assess the security of software with respect to tactics. Fuzzy Analytic Network Process (F-ANP) is applied to evaluate the weights of criteria and fuzzy-Symmetrical technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is used to determine impact of alternatives. The proposed symmetrical assessment in this study will be beneficial for both the designers and developers to categorize and prioritize the security attributes and understand the importance of security tactics during software development life cycle.https://www.mdpi.com/2073-8994/12/4/598software securitysymmetrical assessmentsecurity tacticsfuzzy logicfuzzy-ANPfuzzy-TOPSIS |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Alka Agrawal Adil Hussain Seh Abdullah Baz Hosam Alhakami Wajdi Alhakami Mohammed Baz Rajeev Kumar Raees Ahmad Khan |
spellingShingle |
Alka Agrawal Adil Hussain Seh Abdullah Baz Hosam Alhakami Wajdi Alhakami Mohammed Baz Rajeev Kumar Raees Ahmad Khan Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective Symmetry software security symmetrical assessment security tactics fuzzy logic fuzzy-ANP fuzzy-TOPSIS |
author_facet |
Alka Agrawal Adil Hussain Seh Abdullah Baz Hosam Alhakami Wajdi Alhakami Mohammed Baz Rajeev Kumar Raees Ahmad Khan |
author_sort |
Alka Agrawal |
title |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective |
title_short |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective |
title_full |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective |
title_fullStr |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective |
title_full_unstemmed |
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective |
title_sort |
software security estimation using the hybrid fuzzy anp-topsis approach: design tactics perspective |
publisher |
MDPI AG |
series |
Symmetry |
issn |
2073-8994 |
publishDate |
2020-04-01 |
description |
Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for software products from individuals as well as the organizations is in itself a big challenge for the designers and developers. Meanwhile, adopting traditional and informal learnings to address security issues of software products has made it easier for cyber-criminals to expose software vulnerabilities. Hence, it is imperative for the security practitioners to employ a symmetric mechanism so as to achieve the desired level of software security. In this context, a decision-making approach is the most symmetrical technique to assess the security of software in security tactics perspective. Since the security tactics directly address the quality attribute concerns, this symmetric approach will be highly effective in making the software systems more secure. In this study, the authors have selected three main attributes and fifteen sub-attributes at level 1 and level 2, respectively, with ten different software of an institute as alternatives. Furthermore, this study uses a fuzzy-based symmetrical decision-making approach to assess the security of software with respect to tactics. Fuzzy Analytic Network Process (F-ANP) is applied to evaluate the weights of criteria and fuzzy-Symmetrical technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is used to determine impact of alternatives. The proposed symmetrical assessment in this study will be beneficial for both the designers and developers to categorize and prioritize the security attributes and understand the importance of security tactics during software development life cycle. |
topic |
software security symmetrical assessment security tactics fuzzy logic fuzzy-ANP fuzzy-TOPSIS |
url |
https://www.mdpi.com/2073-8994/12/4/598 |
work_keys_str_mv |
AT alkaagrawal softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT adilhussainseh softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT abdullahbaz softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT hosamalhakami softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT wajdialhakami softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT mohammedbaz softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT rajeevkumar softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective AT raeesahmadkhan softwaresecurityestimationusingthehybridfuzzyanptopsisapproachdesigntacticsperspective |
_version_ |
1724811294902583296 |