Correlating Propensity Between Code Smells and Vulnerabilities in Java Applications

Authors

  • Kritika 1Government of India, New Delhi, India

Keywords:

Code smell, Vulnerability, software metrics, machine learning, K means clustering, data mining

Abstract

The ever-advancing world in terms of technology from web 1.0 to web 3.0, the need for designing and developing software applications has increased many folds. The digitalization of everything at a quick pace from including banking applications, mobile gaming etc. has led to the negligence of the part of the software developers which has led to increment in maintainability as well as security issue of the application, namely, code smells and vulnerability respectively. Code smells are the niggardly practices followed while developing a software by the developers or the software engineers, thwacking the rudimentary delineation principles and cynically thwacking delineation idiosyncrasy. Vulnerability is the snag, glitch or blemishes existing in software or operating system allowing the attackers to derelict the security measures. The paper focusses on finding the relationship between the code smells and vulnerability detected using an Eclipse plugin, PMD and correlating them using software metrics and rule-based machine learning approach.

 

References

Fontana, F. A., Zanoni, M., Marino, A., & Mäntylä, M. V, “Code smell detection: Towards a machine learning-based approach”, IEEE international conference on software maintenance, pp. 396-399, 2013.

Alhazmi, O., Malaiya, Y., & Ray, I, “Security vulnerabilities in software systems: A quantitative perspective”, In IFIP Annual Conference on Data and Applications Security and Privacy, pp. 281-294, 2005.

KS, V. K, “A method for predicting software reliability using object oriented design metrics”, “International Conference on Intelligent Computing and Control Systems (ICCS), pp. 679-682, 2019.

Elia, I. A., Antunes, N., Laranjeiro, N., & Vieira, M, “An analysis of openstack vulnerabilities”, “13th European Dependable Computing Conference (EDCC)”, pp. 129-134, 2017.

Reutemann, G. H. B. P. P., Hall, I. H. W. M., Frank, E., & Witten, I. H, “The weka data mining software: An update”, SIGKDD Explorations, Vol. 11, Issue. 1, pp. 10-18, 2009.

Kirkby, R., & Frank, E, “WEKA Explorer User Guide for Version 3-4”, University of Weikato, pp.3-4, 2002.

Di Nucci, D., Palomba, F., Tamburri, D. A., Serebrenik, A., & De Lucia, A, “Detecting code smells using machine learning techniques: are we there yet?”, Ieee 25th international conference on software analysis, evolution and reengineering (saner), pp. 612-621, 2018.

Kim, D.K., “Finding bad code smells with neural network models” International Journal of Electrical and Computer Engineering, Vol. 7, Issue. 6, p.3613, 2017.

Pessoa, T., Monteiro, M.P. and Bryton, S, “ An eclipse plugin to support code smells detection” arXiv preprint arXiv:1204.6492, 2012.

Sharma, S., & Rathore, M, “Comparison Study of Classification Techniques for Predicting Performance of Students Using Weka Environment”, “Rising Threats in Expert Applications and Solutions, (pp. 673-681), 2022.

Rezaei, E., Ghoreyshi, K., Dimitrov, Y., Sadique, K. M., & Campos, J, “Data Mining with WEKA”, 2021.

Medeiros, N., Ivaki, N., Costa, P., & Vieira, M, “Vulnerable code detection using software metrics and machine learning”, IEEE Access, 8, 2020.

Pereira dos Reis, J., Brito e Abreu, F., de Figueiredo Carneiro, G., & Anslow, C, “Code smells detection and visualization: a systematic literature review”, Archives of Computational Methods in Engineering, Vol. 29, Issue.1, pp. 47-94, 2022.

Rattan, D., Bhatia, R., & Singh, M, “Software clone detection: A systematic review”, Information and Software Technology, Vol. 55, Issue.7, pp. 1165-1199, 2013.

Kaur, A, “A systematic literature review on empirical analysis of the relationship between code smells and software quality attributes”, Archives of Computational Methods in Engineering, Vol. 27, Issue. 4, pp. 1267-1296, 2020.

Santos, J. A. M., Rocha-Junior, J. B., Prates, L. C. L., do Nascimento, R. S., Freitas, M. F., & de Mendonça, M. G, “A systematic review on the code smell effect”, Journal of Systems and Software, Vol.144, pp. 450-477, 2018.

Elkhail, A. A., & Cerny, T, “On relating code smells to security vulnerabilities”, IEEE 5th intl conference on big data security on cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE intl conference on intelligent data and security (IDS) pp. 7-12, 2019.

Aggarwal, K. K., Singh, Y., Kaur, A., & Malhotra, R, “Software Design Metrics for Object-Oriented Software, J. Object Technol., Vol.6, Issue.1, pp. 121-138, 2007.

Dewangan, S., Rao, R.S., Mishra, A. and Gupta, M., 2022. Code Smell Detection Using Ensemble Machine Learning Algorithms. Applied Sciences, 12(20), p.10321 2022.

Sehgal, R., Mehrotra, D. and Nagpal, R, “Is refactoring a solution to resolve code smell?”, International Journal of System of Systems Engineering, Vol.12, Issue.4, pp.371-385. 2022.

Madeyski, L. and Lewowski, T., “Detecting code smells using industry-relevant data”, Information and Software Technology, p.107112. 2023.

S. D. Raut and S. A. Thorat, "Deep Learning Techniques: A Review," International Journal of Scientific Research in Computer Science and Engineering, vol.8, Issue.1, pp. 105-109, 2020.

Anoushka, Shivani Dubey, Vikas Singhal, "Student Grade Prediction by using Machine Learning Methods and Data Analytics Techniques," International Journal of Scientific Research in Computer Science and Engineering, vol.10, no. 6, pp. 22-29, 2022.

Downloads

Published

2023-02-28

How to Cite

[1]
Kritika, “Correlating Propensity Between Code Smells and Vulnerabilities in Java Applications”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 11, no. 1, pp. 23–28, Feb. 2023.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.