IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics

Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics
View Sample PDF
Author(s): M. D. J. S. Goonetillake (School of Computing, University of Colombo, Sri Lanka), Rangana Jayashanka (School of Computing, University of Colombo, Sri Lanka) and S. V. Rathnayaka (School of Computing, University of Colombo, Sri Lanka)
Copyright: 2022
Volume: 16
Issue: 1
Pages: 26
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco) and Ahmed A. Abd El-Latif (Menoufia University, Egypt)
DOI: 10.4018/IJISP.2022010103

Purchase

View Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics on the publisher's website for pricing and purchasing information.

Abstract

Assigning developers for highly secured software projects requires identifying developers’ tendency to contribute towards vulnerable software codes called developer-centric security vulnerability to mitigate issues on human resource management, financial and project timelines. There are problems in assessing the previous codebases in evaluating the developer-centric security vulnerability level of each developer. Thus, this paper suggests a method to evaluate this through the techno-behavioral features of their previous projects. Consequently, we present results of an exploratory study of the developer-centric security vulnerability level prediction using a dataset of 1827 developers by logically selecting 13 techno-behavioral features. Our results depict that there is a correlation between techno-behavioral features and developer-centric security vulnerability with 89.46% accuracy. This model enables to predict developer-centric security vulnerability level of any developer if the required techno-behavioral features are available avoiding the analysis of his/her previous codebases.

Related Content

Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang. © 2022. 22 pages.
Abdallah Soualmi, Adel Alti, Lamri Laouamer. © 2022. 18 pages.
M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka. © 2022. 26 pages.
Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo, Sergio Takeo Kofuji. © 2022. 16 pages.
Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor Lychkov. © 2022. 17 pages.
Danish Ahamad, Md Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom. © 2022. 20 pages.
Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao. © 2022. 24 pages.
Body Bottom