Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Languages: English
Types: Doctoral thesis
Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. However, most of the current approaches used for evaluating software designs require the involvement of security experts because many software developers often lack the required expertise in making their software secure.\ud In this research the current approaches used in integrating security at the design level is discussed and a new method of evaluating software design using neural network as evaluation tool is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. Also, with the proposed neural network tool this research found out that the identified attack patterns can be matched to security patterns that can provide mitigation to the threat in the attack pattern.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 2. Adebiyi, A., et.al., (2012), 'Evaluation of Software Design using Neural Network', In the proceedings of the 8th International Conference on Web Information Systems and Technologies (WEBIST), Porto, Portugal
    • 3. Adebiyi, A., et.al., (2012), 'Matching Attack pattern to Security Pattern using Neural Network', In the proceedings of the European Conference on Information Warfare and Security (ECIW-2012), Paris, France
    • 4. Adebiyi A., et.al., (2012), 'Applicability of Neural Network to Software Security' In proceedings of the UKSim 14th International Conference on Computer Modelling and Simulation, Cambridge, United Kingdom, pp19-24
    • 5. Adebiyi, A. et.al (2012), Using Neural Network for Security Analysis in Software Design, , In the proceedings of the WORLDCOMP'12 conference, Las Vegas, USA.
    • 6. Adebiyi, A., et.al (2012), 'Security assessment of software design using neural network' International Journal of Advanced Research in Artificial Intellige nce (IJARAI), Vol.1.4, pp1-6
    • 7. Adebiyi, A., et.al (2012), 'Using neural network to propose solutions to threats in attack pattern' International Journal of Soft Computing and Software Engineering (JSCSE) Vol.3.1, pp1-11
    • 8. Adebiyi, A., et.al (2012), 'Security evaluation of online shopping cart using neural network' International Journal of Computer Application (IJCA), Vol.6.2, pp83 -93
    • 9. Adebiyi, A., et.al (2013), 'A neural network based security tool for analysing software design' Paper submitted and accepted for the 4th Doctoral Conference of Computing, Electrical and Industrial Systems (DoCEIS) 2013.
    • 10. Adebiyi, A., et.al (2013), 'Resolving threats in attack patterns by security patterns using neural network. Abstract accepted for the International Conference o n Information and Intelligent Systems (ICIIS) 2013.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article