Abstract

Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website. Increasing number of vulnerabilities increase the level of security requirements. Hence, security design tactics are to be adopted to satisfy these security requirements. Security design tactics are the mechanisms to define, detect and mitigate vulnerabilities and attacks. Therefore, faults in the application of security tactics or their weakening during website maintenance could be one of the key reasons behind the emergence of new and severe vulnerabilities that can be targeted by the hackers. There is a need for in-depth analysis of security tactics and its prioritization for the sake of determining the most prioritized factor. This will further help in gaining a more secure system. In this research study, the authors have used the hybrid method of Fuzzy AHP-TOPSIS (Analytic Hierarchy Process-Technique for Order Preference by Similarity Ideal Solution) for the evaluation of security design tactics and its attributes. The efficiency of this approach has been tested on a real time web application of Babasaheb Bhimrao Ambedkar University, Lucknow, India. Further, different web applications of the University have been used to validate the obtained results. This study's evaluation of the most impactful web application design for improving security will help the architects to secure systems by using security tactics.

Highlights

  • Software was designed to satisfy the business goals of organizations

  • The authors of the present study have evaluated the weights of the security tactics through Fuzzy-AHP technique and the impacts of the factors on different alternatives have been estimated through Fuzzy-TOPSIS method

  • IMPLEMENTATION AND RESULTS Mostly, qualitative assessment is appropriate for prioritizing security design tactics

Read more

Summary

INTRODUCTION

Software was designed to satisfy the business goals of organizations. Software architecture is the association between its design and desired goal [1]. For the achievement of this goal, website developers work thoroughly from ground to top of security of design [2]. This article takes a Fuzzy AHP-TOPSIS evaluation model for prioritization of contributing factors of security design tactics and overall security assessment with respect to alternatives. This evaluation will help the security designers in maintaining and improving web application security through weights of specific factors at the early stage of development life cycle. The authors of the present study have evaluated the weights of the security tactics through Fuzzy-AHP technique and the impacts of the factors on different alternatives have been estimated through Fuzzy-TOPSIS method. Discussion and conclusion are presented in the eighth and ninth sections, respectively

RELATED WORK
D xi1j
VIII. DISCUSSION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.