THE SOFTWARE SECURITY DECISION SUPPORT METHOD DEVELOPMENT

Main Article Content

Zhang Liqiang
Nataliia Miroshnichenko

Abstract

The actuality of the power to improve the accuracy of the results was determined in order to make a decision about the process of testing the software security. An analysis of the methods of support for making a decision was carried out. The necessity and feasibility of improving the accuracy of the results was determined in case of further software security inconsistencies in the minds of the fuzziness of input and intermediate data. With this method, on the basis of the mathematical apparatus of fuzzy logic, the method of support for making a decision about the security of software security has been developed. The main feature of this method is the synthesis of an improved method of generating the initial vibration in the process of starting a piece of neural string. Within the framework of the model, the next stages of follow-up are reached. For the mathematical formalization of the process of accepting the decision and designation of the input data, the model of forming the vector in the input data was developed. Depending on this model for shaping the input data, an anonymous sign of potential inconsistencies and undeclared possibilities of the PP is valid until the data of PVS-Studio Analysis Results. To improve the accuracy of the classification of data collected, the method of creating a piece of neural array has been improved, which is modified by the method of generating a sample, which is being developed. This generation method includes three equal generations: generation of the initial vibration, generation of the initial butt and generation of a specific value of the safety characteristic. This made it possible to increase the accuracy of classification and acceptance of the solution by 1.6 times for positive elements in the selection by 1.2 times for negative elements in the selection. To confirm the effectiveness of the development of the method of support for the decision on how to ensure software security, a ROC-analysis was carried out over the course of the above procedures. The results of the experiment confirmed the hypothesis about the efficiency of the divided method of support to make a decision about the security of PZ up to 1.2 times equal to the methods, which are based on the position of discriminant and cluster analysis.

Article Details

How to Cite
Liqiang, Z., & Miroshnichenko, N. (2022). THE SOFTWARE SECURITY DECISION SUPPORT METHOD DEVELOPMENT. Advanced Information Systems, 6(1), 97–103. https://doi.org/10.20998/2522-9052.2022.1.16
Section
Methods of information systems protection
Author Biographies

Zhang Liqiang, Типовий університет Нейцзяна, Нейцзян, Китай

 teacher, College of Computer Science

Nataliia Miroshnichenko, National Technical University "Kharkiv Polytechnic Institute", Kharkiv, Ukraine

Candidate of Technical Sciences, Associate Professor of Computer Engineering and Programming Department

References

Semenov, S., Zhang, L., Cao, W., Bulba, S. & Davydov, V. (2021), “Development of a fuzzy GERT-model for investigating common software vulnerabilities”, EEJET, Vol. 6(2, 114), pp. 6–18, DOI: https://doi.org/10.15587/1729-4061.2021.243715

Semenov, S., Liqiang, Z., Weiling, C. & Davydov, V. (2021), “Development a mathematical model for the software security testing first stage”, EEJET, Vol. 3(2, 111), pp. 24–34, DOI: https://doi.org/10.15587/1729-4061.2021.233417

(2021), Introduction Welcome to the OWASP Top 10 – 2021, available to: https://owasp.org/Top10/

(2015), Dan Sullivan Six criteria for procuring security analytics software, available to:

https://www.techtarget.com/searchsecurity/feature/Six-criteria-for-procuring-security-analytics-software

(2022), CWE List Version 4.1, available to: https://cwe.mitre.org/data/

Schilling, A., Maier, A., Gerum, R., Metzner, C. & Krauss, P. (2021), “Quantifying the separability of data classes in neural networks”, Neural Networks, Vol. 139, pp. 278-293, DOI: https://doi.org/10.1016/j.neunet.2021.03.035.

Gelvih, M. (2021), CWE Top 25 2021, available to: https://pvs-studio.com/en/blog/posts/0869/

Zhao, Z., Xu, Sh., B. Ho, Kang, Kabir, M., Liu, Yu. & Wasinger, R. (2015),”Investigation and improvement of multi-layer perceptron neural networks for credit scoring”, Expert Systems with Applications, Vol. 42, Is. 7, pp. 3508-3516, DOI: https://doi.org/10.1016/j.eswa.2014.12.006

Zaki, P.W. (2019), “A Novel Sigmoid Function Approximation Suitable for Neural Networks on FPGA”, 2019 15th Int. Computer Engineering Conference (ICENCO), pp. 95-99, DOI: https://doi.org/10.1109/ICENCO48310.2019.9027479.

Kleyko, D., Rosato, A., Frady, E.P., Panella, M. & Friedrich, T. (2012), Sommer Perceptron Theory for Predicting the Accuracy of Neural Networks, available to: https://arxiv.org/pdf/2012.07881.pdf

Dzerzhinsky, R.I., Trifonov, M.D. & Ledovskaya, E.V. (2021), “The Support Vectors and Random Forest Methods Analysis in the Forecasting Customer Churn Problem in Banking Services”, Data Science and Intelligent Systems, CoMeSySo, Lecture Notes in Networks and Systems, vol 231, Springer, Cham, available to: https://doi.org/10.1007/978-3-030-90321-3_26

(2021), Introduction to Python Programming (Beginner’s Guide), available to:

https://www.analyticsvidhya.com/blog/2021/05/introduction-to-python-programming-beginners-guide/

Gavrylenko, S., Chelak, V., Semenov, S. & Chelak E. (2019), “Development of anomalous computer behavior detection method based on probabilistic”, Security in cervatury, the social internet space in context values and hazards, Slupsk-Kharkiv, pp. 237-258.