Review And Analysis Of Existing Software Security Patterns

!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!

!!!! Open Access Journal !!!!

Category: 
Technology
Author: 

Y.C. Kulkarni, Assistant Professor, Bharati Vidyapeeth Deemed University’s College of Engineering, Pune.

Dr. Rajesh S. Prasad, Professor, ZES's Dnyanganga College of Engineering and Research, Pune.

Abstract: 

Now a days in modern computer era software utilization is applicable to every social and economic field. The software system depends on factors-Reliability, Performance and Security.  Unreliable software causes inconvenience to even causing disastrous incidents and economic loss. Like because software system failure causes disaster during space launch. Second factor of software system is performance. If system is not responding as per the requirement and demand of the customer then it could cause inefficiency and delay in operation causing, loss of  economic and time as well as unhappiness of the customer. With these two factors of software system the third factor i.e. the issue of managing security of software is to be given more importance because of widespread use of computer communication techniques and Internet.

 

Insecure software could cause eavesdropping and intruder to interfere during communication and take control over the system. For e.g. Bank frauds to terrorist attacks. Therefore once the  reliable and well performance software is built then the third issue of software security is to be maintained throughout all phases of SDLC. Due to this security has become an important issue for software systems and of keen interest of the industrial and research community during last years, aiming security of software through many ways while designing the software system. Major  problems faced by software developers and designers while applying the security solutions because of lack of sufficient information about the on/ of sudden attacks made on software system, unawareness about the intrusion and knowledge of method to overcome the problem occurred.

 

Most of attacks occur vulnerabilities causing poorly designed software and least care is taken regarding the security making software holes (software holes are scope to interfere for attacker) through which attacker can easily interfere into software system causing the threat to software system. One of the ways to achieve the goal of maintaining security is by applying security patterns in software systems. Software security patterns are packaged solution for handling recurring security problems.

 

These patterns provide the facility of solving the problems occurring related with security and maintain a level of security. Existing security patterns provides guidelines for secure system design and evaluation. They focus on implementation issues. Numbers of guidelines are presented in the existing security patterns. We evaluate the existing security patterns based on how they meet and maintain security throughout the design phase, Probabilities ofwhat all types of problems those may occur in building secure software system and identify the missing aspects in existing software security patterns. The scheme will be based on literature survey on existing software security patterns those published in the period of 1995 to 2013 to cover the whole bandwidth of existing security pattern.
 

Rating: 
Average: 4 (2 votes)