Applying the knowledge base of CWE weaknesses in software design

The article deals with the issues of organizing software weaknesses by the software architect at the stage of its design using the developed ontological knowledge base of CWE weaknesses. The main goal of this research is to analyze the software defect system based on CWE and develop an ontology mode...

Full description

Bibliographic Details
Main Authors: Zh. E. Sartabanova, V. T. Dimitrov, S. M. Sarsimbayeva
Format: Article
Language:English
Published: Al-Farabi Kazakh National University 2020-12-01
Series:Вестник КазНУ. Серия математика, механика, информатика
Subjects:
Online Access:https://bm.kaznu.kz/index.php/kaznu/article/view/822/590
_version_ 1818921335956439040
author Zh. E. Sartabanova
V. T. Dimitrov
S. M. Sarsimbayeva
author_facet Zh. E. Sartabanova
V. T. Dimitrov
S. M. Sarsimbayeva
author_sort Zh. E. Sartabanova
collection DOAJ
description The article deals with the issues of organizing software weaknesses by the software architect at the stage of its design using the developed ontological knowledge base of CWE weaknesses. The main goal of this research is to analyze the software defect system based on CWE and develop an ontology model (knowledge base) of this system for software architects. The use of artificial intelligence tools, in particular the development of knowledge bases based on weaknesses, will provide new opportunities for searching and researching software weaknesses. This model being developed will be useful for application by software developers, researchers in the field of software design and cybersecurity, as well as teachers of educational institutions that conduct courses in software development technology and information security. For developers, this model can serve as an assistant and reference when designing software, since weaknesses are organized by a well-known security tactic, helping the designer to embed security during the design process instead of detecting weaknesses after the software has been created. Researchers will be interested in studying and applying software weaknesses in their work. Teachers can use this model as a reference when studying and discussing security vulnerabilities in software design or architecture, as well as the types of errors that can be made during software development. The functions of the software architect are analyzed, and an example of the built ontological knowledge base of CWE weaknesses is given.
first_indexed 2024-12-20T01:36:01Z
format Article
id doaj.art-2ec0ab0e2faa434a8ebe0294efda23c0
institution Directory Open Access Journal
issn 1563-0277
2617-4871
language English
last_indexed 2024-12-20T01:36:01Z
publishDate 2020-12-01
publisher Al-Farabi Kazakh National University
record_format Article
series Вестник КазНУ. Серия математика, механика, информатика
spelling doaj.art-2ec0ab0e2faa434a8ebe0294efda23c02022-12-21T19:58:00ZengAl-Farabi Kazakh National UniversityВестник КазНУ. Серия математика, механика, информатика1563-02772617-48712020-12-0110847280https://doi.org/10.26577/JMMCS.2020.v108.i4.06Applying the knowledge base of CWE weaknesses in software designZh. E. Sartabanova0https://orcid.org/0000-0003-4942-5117V. T. Dimitrov1https://orcid.org/0000-0002-7441-253XS. M. Sarsimbayeva2https://orcid.org/0000-0003-1536-3042K.Zhubanov Aktobe Regional University, Aktobe, KazakhstanSofia University ST.Kliment Ohridski, Sofia, BulgariaK.Zhubanov Aktobe Regional University, Aktobe, KazakhstanThe article deals with the issues of organizing software weaknesses by the software architect at the stage of its design using the developed ontological knowledge base of CWE weaknesses. The main goal of this research is to analyze the software defect system based on CWE and develop an ontology model (knowledge base) of this system for software architects. The use of artificial intelligence tools, in particular the development of knowledge bases based on weaknesses, will provide new opportunities for searching and researching software weaknesses. This model being developed will be useful for application by software developers, researchers in the field of software design and cybersecurity, as well as teachers of educational institutions that conduct courses in software development technology and information security. For developers, this model can serve as an assistant and reference when designing software, since weaknesses are organized by a well-known security tactic, helping the designer to embed security during the design process instead of detecting weaknesses after the software has been created. Researchers will be interested in studying and applying software weaknesses in their work. Teachers can use this model as a reference when studying and discussing security vulnerabilities in software design or architecture, as well as the types of errors that can be made during software development. The functions of the software architect are analyzed, and an example of the built ontological knowledge base of CWE weaknesses is given.https://bm.kaznu.kz/index.php/kaznu/article/view/822/590cwesoftware weaknessesontologyknowledge basessoftware architectprotegesemantic websparql
spellingShingle Zh. E. Sartabanova
V. T. Dimitrov
S. M. Sarsimbayeva
Applying the knowledge base of CWE weaknesses in software design
Вестник КазНУ. Серия математика, механика, информатика
cwe
software weaknesses
ontology
knowledge bases
software architect
protege
semantic web
sparql
title Applying the knowledge base of CWE weaknesses in software design
title_full Applying the knowledge base of CWE weaknesses in software design
title_fullStr Applying the knowledge base of CWE weaknesses in software design
title_full_unstemmed Applying the knowledge base of CWE weaknesses in software design
title_short Applying the knowledge base of CWE weaknesses in software design
title_sort applying the knowledge base of cwe weaknesses in software design
topic cwe
software weaknesses
ontology
knowledge bases
software architect
protege
semantic web
sparql
url https://bm.kaznu.kz/index.php/kaznu/article/view/822/590
work_keys_str_mv AT zhesartabanova applyingtheknowledgebaseofcweweaknessesinsoftwaredesign
AT vtdimitrov applyingtheknowledgebaseofcweweaknessesinsoftwaredesign
AT smsarsimbayeva applyingtheknowledgebaseofcweweaknessesinsoftwaredesign