• DocumentCode
    3248778
  • Title

    Security on Software Life Cycle using Intrusion Detection System

  • Author

    Min, Myat Myat ; Hla, Khin Haymar Saw

  • Author_Institution
    Comput. Studies Univ., Yangon
  • fYear
    2005
  • fDate
    10-10 Nov. 2005
  • Firstpage
    360
  • Lastpage
    363
  • Abstract
    In software development process, many engineering disciplines rely on engineering failure data to improve their designs. We expect that security analysts can use this approach to document and identify commonly occurring attack patterns and that the information system designer and analysts can use these patterns to develop more survivable information systems. A formal approach to security in the software life cycle is essential to protect corporate resources. Software security has been treated as an afterthought leading to a cycle of software development. Due to its criticality, security should be integrated as a formal approach in the software life cycle. It includes the critical areas of requirements analysis and specification, design and code issues, and maintenance and decommissioning of software and systems. We propose an attack detection method based on clustering technique that provide network intrusion detection systems to identify attacks with a high detection rate and a low false alarm rate in analysis and design phase of the software development life cycle. We critically focus on the analysis of security and classification of attack pattern for the software life cycle
  • Keywords
    codes; security of data; software engineering; attack detection method; attack patterns; clustering technique; code issues; engineering failure data; information system designer; network intrusion detection systems; requirements analysis; software development life cycle security; software development process; survivable information systems; Data engineering; Data security; Design engineering; Information analysis; Information security; Information systems; Intrusion detection; Pattern analysis; Phase detection; Programming; Clustering techniques; Intrusion detection system; Software design;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information and Telecommunication Technologies, 2005. APSITT 2005 Proceedings. 6th Asia-Pacific Symposium on
  • Conference_Location
    Yangon
  • Print_ISBN
    4-88552-216-1
  • Type

    conf

  • DOI
    10.1109/APSITT.2005.203685
  • Filename
    1593492