Abstract
Security has become an important issue for software systems. The numbers of threats are advancing day by day making it more challengeable to cope with it. During the software development life cycle (especially security oriented applications) it is difficult for the novice users to adopt the security measures correctly. A lot of security patterns are available but the question is how to choose the right pattern from the set of given patterns. For this reason we proposed a three step methodology which will help in automating the security pattern selection process. We exploit the proposed methodology by leveraging the capabilities of Fuzzy c-mean and Text categorization approach. We used a sample of security patterns along with a set of 3 security problems to assess the efficacy of proposed methodology. The experimental results are promising in terms of organization and selection of security design patterns for given design problems at hand.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hussain, S., Keung, J., Sohail, M.K., Khan, A.A., Ilahi, M.: Automated framework for classification and selection of software design patterns. Appl. Soft Comput. 75, 1–20 (2019). ISSN 1568-4946
Hussain, S., Keung, J., Khan, A.A.: Software design patterns classification and selection using text categorization approach. Appl. Soft Comput. 58, 225–244 (2017). ISSN 1568-4946
Singh, C., Bala, A.: A transform-based fast fuzzy C-means approach for high brain MRI segmentation accuracy. Appl. Soft Comput. 76, 156–173 (2018)
Fernandez, E.B., Washizaki, H., Yoshioka, N., Kubo, A., Fukazawa, Y.: Classifying security patterns. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 342–347. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78849-2_35
Dangler, J.Y.: Categorization of Security Design Patterns. Electronic Theses and Dissertations. Paper 1119 (2013)
Laverdiere, M.A., Mourad, A., Hanna, A., Debbabi, M.: Security design patterns: survey and evaluation conference. In: Proceedings: Canadian Conference on Electrical and Computer Engineering. IEEE, May 2006
Hasheminejad, S.M.H., Jalili, S.: Design patterns selection: an automatic two-phase method. J. Syst. Softw. 85, 408–424 (2012)
Hotho, A., Nurnberger, A., Paab, G.: A brief survey of text mining. J. Comput. Linguist. Lang. Technol. 20, 19–62 (2005)
Hussain, S., et al.: Mining version history to predict the class instability. PLoS ONE 14, e0221780 (2019)
Douglass, B.P.: Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. Addison-Wesley/Longman Publishing Co., Inc., Boston (2002)
Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 6th edn. (2002)
Tichy, W.F.: A catalogue of general-Purpose software design patterns. In: Proceedings of Technology of Object-Oriented Languages and Systems, pp. 330–339 (1997)
Sung, E., Kelley, T.R.: Identifying design process patterns: a sequential analysis study of design thinking. Int. J. Technol. Des. Educ. 29(2), 283–302 (2018). https://doi.org/10.1007/s10798-018-9448-1
Dwivedi, A.K., Tirkey, A., Rath, S.K.: Applying learning-based methods for recognizing design patterns. Innovations Syst. Softw. Eng. 15(2), 87–100 (2019). https://doi.org/10.1007/s11334-019-00329-3
Klotins, E., Unterkalmsteiner, M., Gorschek, T.: Software engineering in start-up companies: an analysis of 88 experience reports. Empir. Softw. Eng. 24(1), 68–102 (2018). https://doi.org/10.1007/s10664-018-9620-y
Jha, Shambhu Kr., Mishra, R.K.: Predicting and accessing security features into component-based software development: a critical survey. In: Hoda, M.N., Chauhan, N., Quadri, S.M.K., Srivastava, P.R. (eds.) Software Engineering. AISC, vol. 731, pp. 287–294. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-8848-3_28
Peng, J., Zhao, S., Dong, J., Liu, Y., Meersmans, J., Li, H., Wu, J.: Applying ant colony algorithm to identify ecological security patterns in megacities. Environ. Model Softw. 117, 214–222 (2019)
Asif, M., Ali, I., Malik, M.S.A., Chaudary, M.H., Tayyaba, S., Mahmood, M.T.: Annotation of software requirements specification (srs), extractions of nonfunctional requirements, and measurement of their tradeoff. IEEE Access 7, 36164–36176 (2019)
van Niekerk, J., Futcher, L.: The use of software design patterns to teach secure software design: an integrated approach. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2015. IAICT, vol. 453, pp. 75–83. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18500-2_7
Hamdy, A., Elsayed, M.: Automatic recommendation of software design patterns: text retrieval approach. J. Softw. 13(4), 260–268 (2018)
Hussain, S.: Threshold analysis of design metrics to detect design flaws. In: ACM Symposium on Applied Computing (SRC), pp. 4–8, April 2016
Hussain, S.: A methodology to predict the instable classes. In: 32nd ACM Symposium on Applied Computing (SAC), Morocco, April 2017
Nahar, N., Sakib, K.: ACDPR: a recommendation system for the creational design patterns using anti-patterns. In: Proceedings of the IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (2016)
Suresh, S., Naidu, M., Kiran, S.A., Tathawade, P.: Design pattern recommendation system: a methodology, data model and algorithms. In: Proceedings of the International Conference on Computational Techniques and Artificial Intelligence (2011)
Smith, S., Plante, D.R.: Dynamically recommending design patterns. In: Proceedings of the 24th International Conference on Software Engineering and Knowledge Engineering (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Zahra, K., Hussain, S., Afzal, H., Mufti, M.R., Khan, D.M., Sohail, M.K. (2021). A Methodology to Automate the Security Patterns Selection. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12382. Springer, Cham. https://doi.org/10.1007/978-3-030-68851-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-68851-6_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68850-9
Online ISBN: 978-3-030-68851-6
eBook Packages: Computer ScienceComputer Science (R0)