全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

The Intelligent Software Systems: The Practical Implementation of Software Security Vulnerabilities Detection Modeling

DOI: 10.4236/oalib.1106831, PP. 1-7

Subject Areas: Computer and Network Security

Keywords: Intelligent Software Systems

Full-Text   Cite this paper   Add to My Lib

Abstract

System products are widely used in almost all applications. Most of the human capacity has been converted to software solutions. Measuring and evaluating the quality of software products has become a problem for many companies that may be looking for software solutions. There are a number of skills that are required and used to make good software. As time goes on, new software is advancing and this has caused security problems to persist and thus affect the software’s performance. New components have introduced a new security system, which is called software security enhancement. In this study, I found the latest methods and techniques used to detect a few software errors and all other security threats. This method has the potential to identify possible symptoms indicating these causes. The new method has the ability to detect weaknesses before an attack. The VDC, which modifies the structure, compares its resources, and then gives a public account of those attacks. This method is used to remove the best security measures used to convince users and developers of the same model that will be used to crack down on software attacks. This paper presents a description of security objectives and best algorithms to address vulnerability issues to provide better results from planned attacks. The article deals with the implementation of the technical program. Finally, an analysis of the results was conducted to demonstrate the performance of this approach to the development of more secure systems.

Cite this paper

Wilson, M. , Liliane, U. and Baptiste, M. J. (2020). The Intelligent Software Systems: The Practical Implementation of Software Security Vulnerabilities Detection Modeling. Open Access Library Journal, 7, e6831. doi: http://dx.doi.org/10.4236/oalib.1106831.

References

[1]  Alwan, Z.S. and Younis, M.F. (2017) Detection and Prevention of SQL Injection Attack: A Survey. International Journal of Computer Science and Mobile Computing, 6, 5-17.
[2]  Miller, R.E. and Arisha, K.A. (2015) Fault Identification in Networks by Passive Testing. 34th Annual Simulation Symposium, Seattle, 26-26 April 2001, 277-284.
[3]  Antunes, N. and Vieira, M. (2015) Assessing and Comparing Vulnerability Detection Tools for Web Services. IEEE Transactions on Services Computing, 8, 269-283. https://doi.org/10.1109/TSC.2014.2310221
[4]  Liu, W., Yang, L. and Zhang, W. (2015) Modelling Binary Oriented Software Buffer-Overflow Vulnerability in Process Algebra. 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Nanjing, 12-14 December 2015, 20-25. https://doi.org/10.1109/PAAP.2015.15
[5]  Khan, K.M. and Han, J. (2013) A Security Characterisation Framework for Trustworthy Component Based Software Systems. 27th Annual International Computer Software and Applications Conference (COMPAC 2003), Dallas, TX, 3-6 November 2003, 164-169.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413