A method for recommending computersecurity training for software developers
<p>Vulnerable code may cause security breaches in software systems resulting in financial and reputation losses for the organizations in addition to loss of their customers confidential data. Delivering proper software security training to software developers is key to prevent such breaches. C...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
MSSTATE
2016
|
Subjects: | |
Online Access: | http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ |
id |
ndltd-MSSTATE-oai-library.msstate.edu-etd-06292016-143609 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MSSTATE-oai-library.msstate.edu-etd-06292016-1436092019-05-15T18:43:59Z A method for recommending computersecurity training for software developers Nadeem, Muhammad Computer Science and Engineering <p>Vulnerable code may cause security breaches in software systems resulting in financial and reputation losses for the organizations in addition to loss of their customers confidential data. Delivering proper software security training to software developers is key to prevent such breaches. Conventional training methods do not take the code written by the developers over time into account, which makes these training sessions less effective. We propose a method for recommending computersecurity training to help identify focused and narrow areas in which developers need training. The proposed method leverages the power of static analysis techniques, by using the flagged vulnerabilities in the source code as basis, to suggest the most appropriate training topics to different software developers. Moreover, it utilizes public vulnerability repositories as its knowledgebase to suggest community accepted solutions to different security problems. Such mitigation strategies are platform independent, giving further strength to the utility of the system.</p> <p> This research discussed the proposed architecture of the recommender system, case studies to validate the system architecture, tailored algorithms to improve the performance of the system, and human subject evaluation conducted to determine the usefulness of the system.</p> <p> Our evaluation suggests that the proposed system successfully retrieves relevant training articles from the public vulnerability repository. The human subjects found these articles to be suitable for training. The human subjects also found the proposed recommender system as effective as a commercial tool. </p> Byron J. Williams David A. Dampier Gary Bradshaw Robert Wesley McGrew MSSTATE 2016-07-22 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report. |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Computer Science and Engineering |
spellingShingle |
Computer Science and Engineering Nadeem, Muhammad A method for recommending computersecurity training for software developers |
description |
<p>Vulnerable code may cause security breaches in software systems resulting in financial
and reputation losses for the organizations in addition to loss of their customers confidential
data. Delivering proper software security training to software developers is key to
prevent such breaches. Conventional training methods do not take the code written by the
developers over time into account, which makes these training sessions less effective. We
propose a method for recommending computersecurity training to help identify focused
and narrow areas in which developers need training. The proposed method leverages the
power of static analysis techniques, by using the flagged vulnerabilities in the source code
as basis, to suggest the most appropriate training topics to different software developers.
Moreover, it utilizes public vulnerability repositories as its knowledgebase to suggest community
accepted solutions to different security problems. Such mitigation strategies are
platform independent, giving further strength to the utility of the system.</p>
<p>
This research discussed the proposed architecture of the recommender system, case
studies to validate the system architecture, tailored algorithms to improve the performance
of the system, and human subject evaluation conducted to determine the usefulness of the
system.</p>
<p>
Our evaluation suggests that the proposed system successfully retrieves relevant training
articles from the public vulnerability repository. The human subjects found these articles
to be suitable for training. The human subjects also found the proposed recommender
system as effective as a commercial tool. </p> |
author2 |
Byron J. Williams |
author_facet |
Byron J. Williams Nadeem, Muhammad |
author |
Nadeem, Muhammad |
author_sort |
Nadeem, Muhammad |
title |
A method for recommending computersecurity training for software developers |
title_short |
A method for recommending computersecurity training for software developers |
title_full |
A method for recommending computersecurity training for software developers |
title_fullStr |
A method for recommending computersecurity training for software developers |
title_full_unstemmed |
A method for recommending computersecurity training for software developers |
title_sort |
method for recommending computersecurity training for software developers |
publisher |
MSSTATE |
publishDate |
2016 |
url |
http://sun.library.msstate.edu/ETD-db/theses/available/etd-06292016-143609/ |
work_keys_str_mv |
AT nadeemmuhammad amethodforrecommendingcomputersecuritytrainingforsoftwaredevelopers AT nadeemmuhammad methodforrecommendingcomputersecuritytrainingforsoftwaredevelopers |
_version_ |
1719086200401166336 |