A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications

There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications. This accelerated growth in the use of web applications has led to increase in the complexity of security and hence the present day developers have to contribute more significantly towards meeting the users’ requirements. However, the high security of web application is not yet efficacious enough because the durability of web application is not as much as it should be. In this context, it is important to consider that ensuring sustainability of security at the early stage of web application development process may reduce costs and rework entailed during the development of secure and durable web applications. Hence, there is a need to focus on increasing the life-span of a secure web application. Quantitative estimation of security-durability plays a significant role for improving the life-span of a secure web application. Thus, to optimize the security assurance effort for a specific life-span, this paper is aimed at estimating the security-durability of web application. For estimating security-durability, this paper uses a hybrid approach of Hesitant Fuzzy (HF) sets, Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) techniques. The effectiveness of the combined approach of HF-AHP-TOPSIS is tested for its accuracy in a web application for an academic institution, Babasaheb Bhimrao Ambedkar University in India. To check the sensitivity of outcomes, authors of the paper have taken altered forms of the University’s web application. The result established contains the security-durability assessment. This work seeks to be an important contribution in enhancing the security-durability and would be beneficial for experts who are working in this domain.

[1]  Dirk van der Linden,et al.  The Effect of Software Warranties on Cybersecurity , 2019, SOEN.

[2]  Nathan Ensmenger,et al.  When Good Software Goes Bad The Surprising Durability of an Ephemeral Technology , 2016 .

[3]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.

[4]  Christopher Kelty,et al.  The Durability of Software , 2015 .

[5]  Mamdouh Alenezi,et al.  Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process , 2019, Int. J. Comput. Intell. Syst..

[6]  Aşkın Özdağoğlu,et al.  An Integration of HF-AHP and ARAS Techniques in Supplier Selection: A Case Study in Waste Water Treatment Facility , 2019, Dokuz Eylul Universitesi Iktisadi ve Idari Bilimler Dergisi.

[7]  Amir Masoud Rahmani,et al.  Trust-based recommendation systems in Internet of Things: a systematic literature review , 2019, Human-centric Computing and Information Sciences.

[8]  Alka Agrawal,et al.  Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS , 2019, IEEE Access.

[9]  Cengiz Kahraman,et al.  Strategic Decision Selection Using Hesitant fuzzy TOPSIS and Interval Type-2 Fuzzy AHP: A case study , 2014, Int. J. Comput. Intell. Syst..

[10]  Liu Xiangchun,et al.  Effective User Interface Design for Consumer Trust Two Case Studies , 2005 .

[11]  Xiaohong Chen,et al.  Hesitant Fuzzy Soft Set and Its Applications in Multicriteria Decision Making , 2014, J. Appl. Math..

[12]  Rajeev Kumar,et al.  Revisiting Software Security: Durability Perspective , 2015 .

[13]  Stephen Judd Trustworthiness in Web Design: 4 Credibility Factors , 2016 .

[14]  Vicenç Torra,et al.  On hesitant fuzzy sets and decision , 2009, 2009 IEEE International Conference on Fuzzy Systems.

[15]  Deep Medhi,et al.  Dependability and security models , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[16]  Mahdi Eftekhari,et al.  Dynamic ensemble selection based on hesitant fuzzy multiple criteria decision making , 2020, Soft Comput..

[17]  Ayfer Başar,et al.  An Expert System Methodology for Planning IT Projects with Hesitant Fuzzy Effort: An Application , 2019, Lecture Notes in Management and Industrial Engineering.

[18]  Hannan Xiao,et al.  A study into the usability and security implications of text and image based challenge questions in the context of online examination , 2018, Education and Information Technologies.

[19]  David J. Hand,et al.  Aspects of Data Ethics in a Changing World: Where Are We Now? , 2018, Big Data.

[20]  Abbas Mardani,et al.  Multiple criteria decision-making techniques and their applications – a review of the literature from 2000 to 2014 , 2015 .

[21]  James J. Cusick Durable Ideas in Software Engineering: Concepts, Methods and Approaches from My Virtual Toolbox , 2018 .

[22]  Francisco Herrera,et al.  Hesitant Fuzzy Sets: State of the Art and Future Directions , 2014, Int. J. Intell. Syst..

[23]  Liming Zhu,et al.  Tradeoff and Sensitivity Analysis in Software Architecture Evaluation Using Analytic Hierarchy Process , 2005, Software Quality Journal.

[24]  Paul Barford,et al.  An Empirical Study of Web Cookies , 2016, WWW.

[25]  Tabasam Rashid,et al.  TOPSIS for Hesitant Fuzzy Linguistic Term Sets , 2013, Int. J. Intell. Syst..

[26]  Francisco Herrera,et al.  Hesitant Fuzzy Linguistic Term Sets for Decision Making , 2012, IEEE Transactions on Fuzzy Systems.

[27]  Alka Agrawal,et al.  Security durability assessment through fuzzy analytic hierarchy process , 2019, PeerJ Comput. Sci..

[28]  Andrew C. Myers,et al.  SIF: Enforcing Confidentiality and Integrity in Web Applications , 2007, USENIX Security Symposium.

[29]  Zeshui Xu,et al.  Hesitant fuzzy information aggregation in decision making , 2011, Int. J. Approx. Reason..

[30]  Kavita Sahu,et al.  Revisiting Software Reliability , 2018, Data Management, Analytics and Innovation.

[31]  Igor Ushakov What Is Reliability , 2012 .