z-logo
open-access-imgOpen Access
A Novel Approach to Determine Software Security Level using Bayes Classifier via Static Code Metrics
Author(s) -
Güncel Sarıman,
Ecir Uğur Küçüksille
Publication year - 2016
Publication title -
elektronika ir elektrotechnika
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.224
H-Index - 26
eISSN - 2029-5731
pISSN - 1392-1215
DOI - 10.5755/j01.eie.22.2.12177
Subject(s) - computer science , software security assurance , software quality , software metric , data mining , software , software quality analyst , software engineering , software construction , source code , static program analysis , verification and validation , regression testing , software sizing , software development , information security , programming language , computer security , statistics , mathematics , security service
Technological developments are increasing day by day and software products are growing in an uncontrolled way. This leads to the development of applications which do not comply with principles of design. Software which has not passed security testing may put the end user into danger. During the processes of error detection and verification of developed software, static and dynamic analysis may be used. Static code analysis provides analysis in different categories while coding without code compile. Source code metrics are also within these categories. Code metrics evaluate software quality, level of risk, and interchangeability by analysing software based on those metrics. In this study, we will describe our web-based application which is developed to determine the level of security in software. In this scope, software's metric calculation method will be explained. The scoring system we used to determine the security level calculation will be explained, taking into account metric thresholds that are acceptable in the literature. Bayes Classifier Method, distinguishing risks in the project files with the analysis of uploaded sample software files, will be described. Finally, objectives of this analysis method and planned activities will be explained

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here