2 research outputs found
Automated Software Architecture Extraction Using Graph-based Clustering
As the size and complexity of software grows developers have an ever-increasing need to understand software in a modular way. Most complex software systems can be divided into smaller modules if the developer has domain knowledge of the code or up-to-date documentation. If neither of these exist discovery of code modules can be a tedious, manual process.
This research hypothesizes that graph-based clustering can be used effectively for automated software architecture extraction. We propose methods of representing relationships between program artifacts as graphs and then propose new partitional algorithms to extract software modules from those graphs. To validate our hypothesis and the partitional algorithms a new set of tools, including a software data miner, cluster builder, graph viewer, and cluster score calculator, were created. This toolset was used to implement partitional algorithms and analyze their performance in extracting modules. The Xinu operating system was used as a case study because it has defined modules that can be compared to the results of the partitional algorithm
Recommended from our members
A new model for worm detection and response. Development and evaluation of a new model based on knowledge discovery and data mining techniques to detect and respond to worm infection by integrating incident response, security metrics and apoptosis.
Worms have been improved and a range of sophisticated techniques have been
integrated, which make the detection and response processes much harder and
longer than in the past. Therefore, in this thesis, a STAKCERT (Starter Kit for
Computer Emergency Response Team) model is built to detect worms attack in
order to respond to worms more efficiently.
The novelty and the strengths of the STAKCERT model lies in the method
implemented which consists of STAKCERT KDD processes and the
development of STAKCERT worm classification, STAKCERT relational model
and STAKCERT worm apoptosis algorithm. The new concept introduced in this
model which is named apoptosis, is borrowed from the human immunology
system has been mapped in terms of a security perspective. Furthermore, the
encouraging results achieved by this research are validated by applying the
security metrics for assigning the weight and severity values to trigger the
apoptosis. In order to optimise the performance result, the standard operating
procedures (SOP) for worm incident response which involve static and dynamic
analyses, the knowledge discovery techniques (KDD) in modeling the
STAKCERT model and the data mining algorithms were used.
This STAKCERT model has produced encouraging results and outperformed
comparative existing work for worm detection. It produces an overall accuracy
rate of 98.75% with 0.2% for false positive rate and 1.45% is false negative rate.
Worm response has resulted in an accuracy rate of 98.08% which later can be
used by other researchers as a comparison with their works in future.Ministry of Higher Education, Malaysia
and Universiti Sains Islam Malaysia (USIM