PreprintPDF Available

Importance of Secure Software Development for the Software Development at Different SDLC Phases

Authors:
Preprints and early-stage research may not have been peer reviewed yet.

Abstract and Figures

p> The advancement of technology has made the development of software applications become unstoppable. The wide use of software applications has increased the threat to cyber security. The recent pandemic required the organization to adapt and manage new threats and cyberattacks due to the rising number of cybercrime activities all around the digital ecosystem. This situation has led to the importance of ensuring that the software is safe to use. Therefore, software development that emphasizes security aspects in every phase of the software development life cycle (SDLC) should be prioritized and practised to minimize cybersecurity problems. In this study, a document survey be conducted to achieve an understanding of secure software development processes and activities. The source of information is retrieved from different reliable resources of scientific research databases such as IEEE, Science Direct and Google Scholar. Moreover, trusted web resources also be referenced to support the argument in the literature study. Findings show that there are several steps of security measures for every phase of SDLC that should be conducted to improve the security performance of the software developed. The author also suggests solutions for dealing with current issues in secure software development which include educating and training the development team on secure coding practices, utilizing automated tools for software testing and implementing continuous automated scanning of threats and vulnerabilities in the system environment.</p
Content may be subject to copyright.
1
Importance of Secure Software Development for the
Software Development at Different SDLC Phases
Faris Mohamed Ahmed Hassan1, Shampa Rani Das1 and Manzoor Hussain2
1 School of Computer Science, Taylors University, Malaysia
2 Faculty of Computing & Information Technology Indus University
farismohd949@gmail.com; shampa.swe@gmail.com; manzoor.hussain@indus.edu.pk
Abstract
The advancement of technology has made the development of software applications become
unstoppable. The wide use of software applications has increased the threat to cyber security.
The recent pandemic required the organization to adapt and manage new threats and
cyberattacks due to the rising number of cybercrime activities all around the digital ecosystem.
This situation has led to the importance of ensuring that the software is safe to use. Therefore,
software development that emphasizes security aspects in every phase of the software
development life cycle (SDLC) should be prioritized and practised to minimize cybersecurity
problems. In this study, a document survey be conducted to achieve an understanding of
secure software development processes and activities. The source of information is retrieved
from different reliable resources of scientific research databases such as IEEE, Science Direct
and Google Scholar. Moreover, trusted web resources also be referenced to support the
argument in the literature study. Findings show that there are several steps of security
measures for every phase of SDLC that should be conducted to improve the security
performance of the software developed. The author also suggests solutions for dealing with
current issues in secure software development which include educating and training the
development team on secure coding practices, utilizing automated tools for software testing
and implementing continuous automated scanning of threats and vulnerabilities in the system
environment.
Keyword: Secure Software Development Lifecycle, cybersecurity threat and vulnerability
1.0 Introduction
Advancement of technology has made the development of software application become
unstoppable which sooner will become the foundation of computer world. However, recent
pandemic that has make organization need to adapt and manage new threat and cyberattack
due to the arising number of cybercrime activities in the internet. Moreover, transition to remote
working has resulted significant implication for cybersecurity [1]. This situation has cause
unexpected cloud migration and rapid IT product and service demand and acquisition in order
to fit in remote working environment. Many organizations pushed or neglected conventional
security procedures in order to keep company operations continuing, without realizing
exposing them to unprecedented level of vulnerability and risk throughout all industries.
The demand for cloud-based services and infrastructure has surged due to COVID-19 which
make people to work remotely. This trends will continuously evolve since more organization
implementing cloud-hosted service to adapt on current situation and keep operation running
[1] [2]. Despite the benefit of cloud services such as flexibility, efficiency and cost reduction,
they remain a major target for cybercriminals. This will required organization to evaluate the
cloud computing security implementation and check current infrastructure for any weakness.
2
Misconfigured cloud setting, for example were the primary source of data breaches in 2020
and has cost of $4.41 million [3].
Ransomware has become the most significant risk for data security of organization and it
became as top cybersecurity concern [4]. Ransomware attacks has cost more compared to
attack of average data breaches. The complexity of the strategies used by cybercriminals is
also increasing. Extortion attacks has become more frequent, in which hackers take a
company's data then encrypt it so they cannot access it. Cybercriminals will then threat to
expose its confidential information unless a ransom is paid. The consequences of this
cyberattack are significant, with sensitive data at stake and the financial consequences of
paying the ransom.
More businesses are using multi-factor authentication (MFA) as a supplemental layer of
protection against data breaches and attacks [5] [6]. For user to access their personal data,
they are required to prove their identity with more than one device. While MFA has become
critical for security precaution, Microsoft has advised users to avoid phone-based MFA (where
one-time passcode is supplied to phone through SMS text) because to current phone network
security flaws [7]. Because SMS-based messages are not encrypted, attackers may retrieve
them in plain text. Instead, organization should use more robust MFA approaches, such as
application-based MFA such as Google Authenticator or Microsoft Authenticator.
Artificial intelligence and machine learning are becoming more sophisticated and capable,
thus make organization utilize these technologies as part of their security infrastructure [8] [9].
AI is increasingly being applied to enhance automated security system that substitute human
interaction, allowing more quick analysis for large volume of risk data. This is advantageous
for both big businesses dealing with vast volumes of data and small and mid-sized businesses
with under-resourced security teams. While AI provides a significant potential for organizations
to improve their threat detection, the innovation and greater application of this technology has
both positive and negative implications. Criminal networks are using AI to automate their
attacks, and they're using strategies like data poisoning and model theft to do it.
2.0 Literature Review
This section will discuss and summarize on previous studies on challenges and issues in
software development, current vulnerabilities in software development, practice of secure
software development software as well as secure software development life cycle.
2.1 Secure Software Development Life Cycle
Development and advancement of technology has make all daily transaction and online based
activities to rely on online application. The wide use of software application has also increase
the threat of software security [10]. This situation has led to the importance of ensuring that
the software is safe to use in order to maintain trust of users in services provided. Therefore,
software development that emphasizes security aspects should be prioritized and practiced in
software development life cycle (SDLC) to minimize cybersecurity problems.
Secure Software Development Life Cycle (S-SDLC) is the integration of best practices aim to
increase security in every phases of standard SDLC [11]. Execution of secure SDLC involves
3
committed work at each phases, from requirement gathering, development to maintenance.
This practices requires commitment from development team that aim to instil and empower
them to build a secure application as a norm instead of just focusing solely on functionality.
With determination and hard work, security issues can be address well before deployment and
production.
SDLC is the foundation of software development models. From SDLC, variety model has being
derived such as Waterfall, Agile, Prototyping, Spiral and Rapid Application Development
(RAD). All these models have the same basic phases with different execution mechanism and
objectives [12]. The basic stages including 1) requirement, 2) design, 3) development, 4)
testing and 5) deployment. Figure 1 shows SDLC with the security measures that need to be
carried out in each phases.
Figure 1: Software Development Life Cycle [11]
Implementation of equally distributed security measures in every phases of software
development phases are crucial and has significantly reduce vulnerability of the system as
well as reducing the cost and time consume to develop the system. This is because installing
a patching software will be much more expensive than solving the issues in real time during
the SDLC phases [13]. Indirectly, this has improved software quality as well as development
productivity and efficiency. [14] [15].
Integration of security practices from the design stages allow security related requirements
are recorded and formalized before the development start. This make both management and
development teams are informed of procedures of development, the software security risks
and threats and not being diverted by irrelevant ones [27]. As a result, the development
strategy can be improve to ensure the code developed as the SDLC progresses.
Studies shows that integration of security approaches on software development life cycle more
emphasize on development phase where coding writing were carried out. Static and dynamic
analysis are the most commonly used methods for performing security measures throughout
the coding phase [16]. Test case prioritization is a technical techniques to rearrange the
execution of test cases for minimizing regression testing expenses. This method also support
4
that coding phase contribute to the highest percentage to the needed of test case prioritization
for cost reducing purpose [17]. Moreover, an automated technique, fuzz testing, can be used
to identify implementation flaws and security vulnerabilities by inputting data that modified and
malformed [18]. This testing has been proven to be cost effective and also has high efficiency
be used in coding phase. These indicate that security practices in coding phases has a vital
role in determining the quality and cost of software development.
In order to decrease the number of software failures, [19] has suggested on autonomic advisor
which will provide recommendations to developer as well as performing risk assessment
throughout SDLC processes. This alternative can enhance the efficiency of SDLC and quality
of developed software. Risk assessment throughout the SDLC cycle will ensure the software
delivered achieve quality with high level of security performance [20].
2.2 Current Security Vulnerabilities in Software Development
Throughout pandemic, there are rising number of organizations experiencing an increasing in
cyberattacks [21]. Due to this scenario, Runtime Application Self Protection (RASP) is now
needed as an extra layer of protection in the latest security and privacy framework standard
[22]. RASP solutions provide extensive application security, including vulnerability prevention,
while consuming resources optimally and contributing minor delay to an application. It
monitors the programme using runtime deterministic security which depend on the program
itself, rather than depending on previous breaches to determine a zero-day attack as well as
OWASP Top Ten Security Vulnerability, by verifying the program control flows.
Open Web Application Security Project (OWASP), a non-profit organization aim to improve
software security and educate community regarding the most common security concern, so
they may implement security policies, reducing the occurrence of known risks. Recently,
OWASP has release Top 10 Security Risk and Vulnerabilities 2021 [23], which listed as below:
1) Injection
It happen when an attacker insert invalid data to the web application and interact with
database query [24] with the aim to make it to do something it does not programmed to
do. It cause by the data used by the web application has not been validate and filtered.
2) Broken Authentication
Attackers can gain control of a system by brute-force tactics. Bad session management
can allow an attacker to take control of the entire system or even worse, take over the
whole thing. It can cause by poor session management and/or bad password protection.
3) Sensitive Data Exposure
It consist of data that should be protected being compromised. Example of sensitive data:
credentials, credit card numbers, medical information, social security number, personal
identifiable information.
4) XML External Entities
Form of XML input parsing attack against an application. When a poorly constructed XML
parser examines XML input containing a reference to an external object, this attack occurs.
5
This caused by vulnerable XML processors, vulnerable code, vulnerable integration and
vulnerable dependencies.
5) Broken Access Control
Access control implies limiting which sections or pages they may access depending of
user level of access. Broken access control happen when outsider can access certain
section that he should not to.
6) Security Misconfigurations
The most common security misconfiguration including unpatched flaws, keeping CMS
default configurations, availability of unused pages, has unprotected files and directories
and installing unnecessary services.
7) Cross Site Scripting (XSS)
XSS attacks occur when attacker putting dangerous client-side scripts into a website and
exploiting it to spread malware. The drawbacks of XSS is attacker can change the way a
website is presented by running malicious code on a victim's browser. It allows an attacker
to upload material into a website and change how it is presented to the victim.
8) Insecure Deserialization
Deserialization is the action of attacker replacing byte strings to objects (structure data) in
order to give themselves admin privileges. For instances, a super cookie with serialized
information about current logged-in user which include information about user’s role. If an
attacker successfully deserializes the object, then alter it to assign himself admin role and
serialize it again. This activities has potential to threaten entire online application.
9) Using Components With Known Vulnerabilities
Personal blogs, for example, now have several dependencies. Failure to update software
program on website’s backend and frontend, relatively soon can cause significant security
problems. Ignoring an update warning could permitting now-known vulnerability to remain
in the system as attacker are eager to look into software and changelogs.
10) Insufficient Logging And Monitoring
Insufficient logging and monitor on website can increase website infiltration. There are
number of ways to keep website examined on regular basis so that quick action can be
taken if something goes wrong.
2.3 Challenges and Limitation in Secure Software Development
Studies from [27] shows that best practices described in the literature deviate significantly from
real-world security approaches. Best practices are frequently ignored since compliance to
those practices would add team’s workload. However, they are making a justifiable cost-
benefit trade-off. This situation shows that best security practices suggested from literature
not aligned with the industry requirements, therefore this may contribute to software
vulnerability and business risk of organization.
6
Due to extreme rising number of data theft and other sorts of cyber threats, software engineer
are more focused on developing more secure software rather than fulfil its functionality. The
introduction of specialized techniques into software development, however, has resulted of
cost rising [28]. This situation caused by the wide range of cyber threats that consistently thrive
which leads to more specialized procedures required to overcome the issues.
Software development is a process of that required continuous improvements. Developers
frequently work in tight dateline established by management teams in an attempt to set
realistic goals, even though achieving such goals might be challenging. However, developers
give their best to develop a secure software, but they may not be able to identify all the flaws
before the release date. Delays may be expensive, which make organization launch the initial
software version and later address any flaws reported by providing security updates, often
known as patches [29].
There are studies that shows application of secure software development practices do not
reach satisfactory level in majority of software industry. This scenario happen due to multiple
factors including lack of direction, a clear guidelines from company’s top management and
there are not specific guidelines on security policy regarding on integration in system
developments [30]. This all factors has leads to weak security measures integration and
expose the software on threats and cyberattacks.
Open source components such as frameworks and libraries are prebuild product that help
developers in reducing development time, but they frequently include unknown dependencies.
A lot of open source components are utilized in a black box way which might result in
establishment of vulnerabilities that lead to unsafe code as well as patching and versioning
compatibility issues. Moreover, the action of download from unauthorized sources might cause
complexity that difficult to manage [31]. Availability of open source components might be ease
of developer’s program writing, but increasing become source of cybersecurity vulnerability
and threats if it not treated properly.
Performing data input validation is one of secure practices that carried out by developer but
programming language, Java for example prohibit code execution inside of JVM instance by
utilizing static strong typing architecture. However, other programming languages, execute all
the native code on metal which expose to risk of malicious application gaining control on
machine’s system software. This also particularly troublesome in mobile industry, where user
may be completely unaware that their devices have been hijacked until it is too late [32].
2.4 Vulnerabilities Prevention and Detection Practices
Cybersecurity attack strategies are constantly being evolve and current ones are expanding,
making cybersecurity issues incredibly unexpected and dynamic. SQL injection suggested to
be most significant threats for web application security as the attack involved for exposure of
sensitive data to unauthorized users, which can cause serious harm to legitimate user [24].
Due to this issues, there are improvement in awareness among developers regarding on the
importance of implementing secure coding practices in software development at the same
time practice based on secure coding guidelines [25]. However, software program are written
by human, and they are inherently flawed. Nobody creates software that fully error-free, which
leaving gaps for prospective attackers. Therefore, software security practices should be
encourage prevent vulnerabilities from being introduced into software and detect
7
vulnerabilities injected during development. Studies from [26] shows the prevention (table 1)
and detection (table 2) of vulnerabilities practices that being used.
Table 1: Practices for prevent vulnerability [26]
Problem
Practices
Bugs
Utilize a top-N bug list (real data preferred)
Follow secure coding guidelines
Average (bugs)
Flaws
Create and publish security features
Convert compliance restrictions into requirements
Work with software security group (SSG) to develop
architecture
Develop data classification scheme and inventory
Unify regulatory pressures
Establish security standards
Make policy for security
Collect and employ attack intelligence
Develop SSG capability to solve difficult design problems
List out potential attackers
Implement and monitor control for compliance
Containerize applications
Identify a personal-identifiable-information data inventory
Create technology stacks standard
Identify open source in apps
Identify and utilize an architectural-analysis process
Build and maintain a top-N potential attacks
Uniform architectural descriptions (including data flow)
Table 2: Practices to identify vulnerability [26]
Problem
Practices
Bugs
External penetration testers to identify issues
Ensure that edge or boundary value condition testing is
supported by quality assurance (QA).
Request SSG to conduct an ad hoc evaluation
Utilize penetration testing tools internally
Use both automated and manual tools to review
All projects are required for code review
Integrate black-box security tools into the QA process
Perform fuzz testing customized to application APIs
QA automation should included in security check
Employ automation to do what attackers will do
Average are bugs
Flaws
External penetration testers to identify issues
Examine security features
Use penetration testing tools internally
8
For high-risk applications, do design review
Integrate black-box security tools into the QA process
Request SSG in charge for design review process
Implement automated tools with custom rules
QA automation should included security checks
Construct multiple analysis that feed into one reporting or
remediation process
Automate malicious-code detection
Employ automation to do what attackers will do
Average in term of faults
Average use of all 16 practices
Secure software development is essential to follow all SDLC phases carefully for the
successful implementation of software and hardware [42-44]. This is equally important for the
various types of software such as web-based systems, Server based systems, Operating
systems, wireless devices, and Internet of Things devices [45-48]. Since the software is the
first baseline for any tool.
Furthermore, if software security is not considered at any phase of the software development,
which easily leads the software to issues and can provide various vulnerabilities and
opportunities to hackers. As mentioned, that software security is important even if belongs to
any group of applications [49-55], whether they belong to any health applications or wireless
applications.
Mainly the application software which is designed using AI and machine learning for smart
homes, smart devices, tiny wireless devices, and the Internet of Things, [56-60] to make them
intelligent and to take smart decisions at the right time are also prone to the software security,
in case if the secure SDLC is not followed properly. This is equally important [61-64] for the
software, which is being used for Industry 4.0, cyber-physical systems, in the cloud for virtual
machines etc. OWASP is an open platform which provides a different range of attacks on the
software for various applications due to the vulnerabilities and loopholes, and these all-impact
different applications [65-67] while they are present due to the lack of secure software
development life cycle implementation.
3.0 Methodology
Methodology technique will determine the reliability and validity of gathered information. In this
studies, document survey be conducted for achieve understanding on secure software
development process and activities. The source of information being retrieve and gathered
from different reliable resources of scientific research databases such as IEEE, Science Direct
and Google Scholar. Moreover, trusted web resources also be referenced to support the
argument in literature study.
Data collection be conducted by making keyword search related to research scope for
narrowing the searching process. For this information gathering activities, keyword such as
‘secure software development lifecycle’, ‘secure coding practices’, ‘current security issue’ and
‘security threats and vulnerabilities’ being used to find information related to this study. Then,
all the search result being analyse and interpret to gain understanding on the articles findings
to form reasonable conclusions. The following are some of the articles we looked into:
9
1) Exploring Software Security Approaches in Software Development Lifecycle: A
Systematic Mapping Study”. The study analysed 118 academic research papers on
software security approach and conclude that most of studies do security practice
measures in coding phase on software development. It also stated static analysis and
dynamic analysis are the most techniques used for security examination on coding phase
[16].
2) A Preventive Secure Software Development Model for a Software Factory: A Case
Study. The study analyse and compare the existing secure software development models
and propose a new secure software development methodology. Experiment be conducted
on all the models and resulted reduce of 68.42% of vulnerabilities on proposed solution
[14].
3) Security in Software Development Lifecycle”. The study examine the real life security
practice in workplace. The result shows there are significant different on security practice
apply in workplace with the best practice suggested in academic research. [27]
This method is utilized due to ease of access of wide range information with reliable and
trusted resources for research purposes due to in-depth of expertise and information.
Moreover, all the researches were supported by real case studies with evidences of analysis
and findings that contains graphs, chart and pictures that assist in clarifying and proven the
research purposes. In addition, all the research studies proven to be reliable since it be
appropriately monitored and finalized by expert panels in the academic area. Meanwhile, web
resources provide author with current information of security in industry written by technical
expertise in security.
4.0 Finding and Discussion
Based on software development lifecycle, security approaches are included in every phases
of development to assist in minimizing of underlying business risks of organization. A secure
SDLC facilitates in effective prevention of most security vulnerabilities, hence securing an
organization from variety of cyberattacks. Discussion below will talk through on recommended
security practices in each phases of SDLC [27] [33] [34] [20].
1) Concept and planning
Establishing project security and compliance goals to ensure development team be
able to resolve security vulnerability as soon as feasible
Write a list of project security requirements, which include technical and regulatory
standard such as including access control, operational boundaries, policy and privacy
[35]
Training session regarding software security to expose development team on threat
and vulnerability awareness
Risk assessment conducted to identify the potential risk, establish technical feasibility
and quality assurance [36].
2) Architecture and design
Develop threat modelling to incorporates evaluating potential attack scenarios and
appropriate preventive measure into application architecture
Validate design document and subsequent modification in security requirements to
discover features that are vulnerable to security threats
10
Checking third-party software on regular basis to identify areas that vulnerable to
compromised components to immediately apply patches.
3) Implementation
Enforcing secure coding standards to remove minor flaws and allow focus on more
crucial activity
Perform Static Application Scanning Testing (SAST) on newly written code to identify
flaws before application builds
Review code manually in timely manner to identify and resolve any issues before
proceeds to other tasks
4) Testing and fixing
Incorporate Dynamic Application Scanning Testing (DAST) with Interactive
Application Security Testing (IAST). This technique combine runtime scanning with
monitoring of the program’s executed code and data flow. It’s detect common
vulnerabilities and configuration issues that compromise security.
Perform fuzzing testing to strengthen defensive capabilities against attacks that take
advantage of faulty inputs
Incorporate with third-party security expert to stimulate possible attacks that
development team might overlook
5) Release and maintenance
Security monitoring that cover environment of system, not just the application
Produce incident response plan that specifies action that must be taken in case of
security breaches as fast execution of action plan is important
Perform continuous security checks since new form of vulnerabilities are constantly
being identified
6) End of life
Check company retention policies for compliance with legal requirements as some
data types are subjected to government-defined retention policies
Properly destroyed all sensitive data such as encryption keys and personal
information stored in application
5.0 Proposed Solution
Vulnerabilities and threat in software program are caused by human error. There is no
software program that error-free since technology landscape is constantly changing which
make cybersecurity trends dynamic and unpredictable. These are some suggestion of solution
to deals with current issue in secure software development:
1) Educate and train development team on secure coding practices
Software program coded by developer, therefore if developer familiar of applying secure
coding practices, software vulnerability can be minimized. However, some of them do not
realise of the consequence of their actions. They think they already know all they need to
know. They lack of understanding on how dangerous the vulnerability can cause to software
developed as well as unaware the important of security practice in software development. This
11
scenario happen as they has no or little comprehension on foundational lesson of security
application. In order to overcome this shortcomings, training program can be conducted to
educate them on secure coding practice. This exposure will enable them to learn, understand
and implement the techniques in encoding program to minimize security risk.
2) Utilizing automated tools for software testing
Availability of commercial automated tools for vulnerability testing has shifted the burden of
developers to conduct manual testing because of capability of automate tool to produce testing
result immediately with generated comprehensive reports. Moreover, utilizing automated tools
ensure high-quality delivered product as well as improve efficiency in overall software
development [37]. This be proven by research study that automate software testing has
demonstrate that it can save approximately 68% of overall software testing automation
process and shortening product launch cycle [38]. In addition, developer can conduct in-depth
test that analyse complicated use cases and lengthy tests with automated testing that
generally be avoided during manual testing.
3) Automated on threat and vulnerability scanning continuously
Pandemic has significantly increase the traffic of network usage as everyone stay connected
virtually via Internet. The use of technology has is speeding up, as seen by the emergence of
multi-perception technologies, artificial intelligence’s appeal and cloud solutions [39].
Therefore, report shows that there is increasing in the number of cybersecurity attacks as
attackers see these situation as an opportunity to make profit [22]. Moreover, advancement of
technology has made technology such as Internet of Things (IoT) and network based wireless
sensor has growing rapidly which has expose to more vulnerability in term of data
transmission, reliability of data and excess to physical cyberattacks [40] [41]. Therefore, author
would like to suggest that automate threat and vulnerability scanning being running
continuously on software environment so that immediate automated actions can be carried
out once cyberattack occur.
6.0 Conclusion
Pandemic COVID-19 has significantly impact the cyber security threat and digital ecosystem.
Increasing number of software utilizing in daily activities make software security become a
priority. Therefore, author would like to suggest that secure software practices should not only
be part of software development phase only (testing phase), vice versa incorporate in every
phases and activities in software developments. With the current situation of unpredictable
cyberattack, security precaution and measures should be emphasized. Software program
written by human, therefore educate and train development team is essential as cyber security
is constantly changing along with cyber threat. It is also encourage for developers to follow
the current trend in security world. There is no perfect secure software application, therefore
developer need to continuously learn and update their knowledge and skills regarding software
security. Moreover, availability of automated security tools should be utilize wisely in order to
improve security quality. Even though there are challenges in implementing secure software
practices, organization should put an effort to make this practice as a culture to produce secure
quality software.
12
References
[1] Weil, T., & Murugesan, S. (2020). IT Risk and Resilience-Cybersecurity Response to
COVID-19. IT Prof., 22(3), 4-10.
[2] Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges
within Industry 4.0 paradigm. Procedia manufacturing, 13, 1253-1260.
[3] TechRepublic. 2021. IBM finds cyberattacks costing companies nearly $4 million per
breach. [online] Available at: <https://www.techrepublic.com/article/ibm-finds-cyberattacks-
costing-companies-nearly-4-million-per-breach/> [Accessed 11 June 2021].
[4] Connolly, L. Y., & Wall, D. S. (2019). The rise of crypto-ransomware in a changing
cybercrime landscape: Taxonomising countermeasures. Computers & Security, 87, 101568.
[5] Das, S., Wang, B., Tingle, Z., & Camp, L. J. (2019). Evaluating user perception of multi-
factor authentication: a systematic review. arXiv preprint arXiv:1908.05901.
[6] Maciej, B., & Kurkowski, M. (2019). Multifactor authentication protocol in a mobile
environment. IEEE Access, 7, 157185-157199.
[7] IT Security News - cybersecurity, infosecurity news. 2021. Microsoft calls for users to stop
using phone-based multi-factor authentication Let me know if there is anything else I can help
you with. IT Security News. [online] Available at: <https://www.itsecuritynews.info/microsoft-
calls-for-users-to-stop-using-phone-based-multi-factor-authentication/> [Accessed 12 June
2021].
[8] Geluvaraj, B., Satwik, P. M., & Kumar, T. A. (2019). The future of cybersecurity: Major role
of artificial intelligence, machine learning, and deep learning in cyberspace. In International
Conference on Computer Networks and Communication Technologies (pp. 739-747).
Springer, Singapore.
13
[9] Li, J. H. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of
Information Technology & Electronic Engineering, 19(12), 1462-1474.
[10] Sharma, A., & Misra, P. (2017). Aspects of Enhancing Security in Software Development
Life Cycle.
[11] Miller, A., 2021. Secure SDLC Let me know if there is anything else I can help you with.
Secure Software Development Life Cycle Let me know if there is anything else I can help you
with. Snyk. [online] Snyk. Available at: <https://snyk.io/learn/secure-sdlc/> [Accessed 10 June
2021].
[12] Akinsola, J. E., Ogunbanwo, A. S., Okesola, O. J., Odun-Ayo, I. J., Ayegbusi, F. D., &
Adebiyi, A. A. (2020, July). Comparative Analysis of Software Development Life Cycle Models
(SDLC). In Computer Science On-line Conference (pp. 310-322). Springer, Cham.
[13] Dawson, M., Burrell, D. N., Rahim, E., & Brewster, S. (2010). Integrating software
assurance into the software development life cycle (SDLC). Journal of Information Systems
Technology and Planning, 3(6), 49-53.
[14] Núñez, J. C. S., Lindo, A. C., & Rodríguez, P. G. (2020). A Preventive Secure Software
Development Model for a Software Factory: A Case Study. IEEE Access, 8, 77653-77665.
[15] de Vicente Mohino, J., Bermejo Higuera, J., Bermejo Higuera, J. R., & Sicilia Montalvo,
J. A. (2019). The application of a new secure software development life cycle (S-SDLC) with
agile methodologies. Electronics, 8(11), 1218.
[16] Mohammed, N. M., Niazi, M., Alshayeb, M., & Mahmood, S. (2017). Exploring software
security approaches in software development lifecycle: A systematic mapping
study. Computer Standards & Interfaces, 50, 107-115.
[17] Nayak, G., & Ray, M. (2021). Survey on Prioritizing Test Cases in Various Levels of the
Software Development Life Cycle. International Journal of Information Technology Project
Management (IJITPM), 12(1), 1-28.
[18] Sorsa, S. (2018). Protocol fuzz testing as a part of secure software development life
cycle (Master's thesis).
[19] Dehraj, P., & Sharma, A. (2019, February). Autonomic Provisioning in Software
Development Life Cycle Process. In Proceedings of International Conference on Sustainable
Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan,
Jaipur-India.
[20] Alenezi, M., & Almuairfi, S. (2019). Security risks in the software development
lifecycle. International Journal of Recent Technology and Engineering, 8(3), 7048-7055.
[21] GovTech. 2021. 2020: The Year the COVID-19 Crisis Brought a Cyber Pandemic. [online]
Available at: <https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2020-the-year-the-
covid-19-crisis-brought-a-cyber-pandemic.html> [Accessed 11 June 2021].
[22] Security Boulevard. 2021. 90% of Companies Faced Increased Cyberattacks During
COVID-19 - Security Boulevard. [online] Available at:
<https://securityboulevard.com/2020/11/90-of-companies-faced-increased-cyberattacks-
during-covid-19/> [Accessed 11 June 2021].
14
[23] Sucuri.net. 2021. [online] Available at: <https://sucuri.net/guides/owasp-top-10-security-
vulnerabilities-2021/> [Accessed 11 June 2021].
[24] Gautam, B., Tripathi, J., & Singh, S. (2018). A Secure Coding Approach For Prevention
of SQL Injection Attacks. International Journal of Applied Engineering Research, 13(11),
9874-9880.
[25] Espinha Gasiba, T., & Lechner, U. (2021). Raising Secure Coding Awareness for
Software Developers in the Industry. arXiv e-prints, arXiv-2102.
[26] Williams, L., McGraw, G., & Migues, S. (2018). Engineering security vulnerability
prevention, detection, and response. IEEE Software, 35(5), 76-80.
[27] Assal, H., & Chiasson, S. (2018). Security in the software development lifecycle.
In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018) (pp. 281-296).
[28] Venson, E., Guo, X., Yan, Z., & Boehm, B. (2019, August). Costing secure software
development: A systematic mapping study. In Proceedings of the 14th International
Conference on Availability, Reliability and Security (pp. 1-11).
[29] The Conversation. 2021. What are software vulnerabilities, and why are there so many of
them?. [online] Available at: <https://theconversation.com/what-are-software-vulnerabilities-
and-why-are-there-so-many-of-them-77930> [Accessed 10 June 2021].
[30] Maher, Z. A., Shah, A., Chan-dio, S., Mohadis, H. M., & Rahim, N. H. B. A. (2020).
Challenges and limitations in secure software development adoption-A qualitative analysis in
Malaysian software industry prospect. Indian Journal of Science and Technology, 13(26),
2601-2608.
[31] Waitt, T., 2019. Secure Software Development: Challenges and Considerations -
American Security Today. [online] American Security Today. Available at:
<https://americansecuritytoday.com/secure-software-development-challenges-and-
considerations/> [Accessed 10 June 2021].
[32] dzone.com. 2021. Secure Coding Challenges Faced by Every Software Developer in
2021 - DZone Security. [online] Available at: <https://dzone.com/articles/secure-coding-
challenges-faced-by-every-software-d> [Accessed 10 June 2021].
[33] Positive Technologies. 2021. How to Approach Secure Software Development. [online]
Available at: <https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-
approach-secure-software-development/> [Accessed 11 June 2021].
[34] DATAVERSITY. 2021. How You Should Approach the Secure Development Lifecycle -
DATAVERSITY. [online] Available at: <https://www.dataversity.net/how-you-should-
approach-the-secure-development-lifecycle/> [Accessed 11 June 2021].
[35] Mohammad, A., Alqatawna, J. F., & Abushariah, M. (2017, May). Secure software
engineering: Evaluation of emerging trends. In 2017 8th International Conference on
Information Technology (ICIT) (pp. 814-818). IEEE.
[36] EC-Council Official Blog. 2021. 5 Phases of the Secure Software Development Life Cycle
(SDLC). [online] Available at: <https://blog.eccouncil.org/5-phases-of-the-secure-software-
development-life-cycle-sdlc/> [Accessed 10 June 2021].
15
[37] AI-driven E2E automation with code-like flexibility for your most resilient tests. 2021. Test
Automation Benefits: 12 Reasons to Automate in 2020. [online] Available at:
<https://www.testim.io/blog/test-automation-benefits/> [Accessed 11 June 2021].
[38] Hanna, M., Aboutabl, A. E., & Mostafa, M. S. M. (2018). Automated software testing
framework for web applications. International Journal of Applied Engineering
Research, 13(11), 9758-9767.
[39] Technology, H., 2021. Top 10 Security Industry Trends in 2021. [online] Prnewswire.com.
Available at: <https://www.prnewswire.com/news-releases/top-10-security-industry-trends-in-
2021-301210650.html> [Accessed 12 June 2021].
[40] Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber
security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science
and Engineering, 45(4), 3171-3189.
[41] Amro, A. (2020). IoT Vulnerability Scanning: A State of the Art. Computer Security, 84-
99.
[42] Kumar, T., Pandey, B., Mussavi, S. H. A., & Zaman, N. (2015). CTHS based energy
efficient thermal aware image ALU design on FPGA. Wireless Personal Communications, 85,
671-696.
[43] Adeyemo, V. E., Abdullah, A., JhanJhi, N. Z., Supramaniam, M., & Balogun, A. O. (2019).
Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion
detection: an empirical study. International Journal of Advanced Computer Science and
Applications, 10(9).
[44] Khalil, M. I., Jhanjhi, N. Z., Humayun, M., Sivanesan, S., Masud, M., & Hossain, M. S.
(2021). Hybrid smart grid with sustainable energy efficient resources for smart cities.
sustainable energy technologies and assessments, 46, 101211.
[45] Sennan, S., Somula, R., Luhach, A. K., Deverajan, G. G., Alnumay, W., Jhanjhi, N. Z., ...
& Sharma, P. (2021). Energy efficient optimal parent selection based routing protocol for
Internet of Things using firefly optimization algorithm. Transactions on Emerging
Telecommunications Technologies, 32(8), e4171.
[46] Kok, S. H., Abdullah, A., & Jhanjhi, N. Z. (2022). Early detection of crypto-ransomware
using pre-encryption detection algorithm. Journal of King Saud University-Computer and
Information Sciences, 34(5), 1984-1999.
[47] Verma, S., Kaur, S., Rawat, D. B., Xi, C., Alex, L. T., & Jhanjhi, N. Z. (2021). Intelligent
framework using IoT-based WSNs for wildfire detection. IEEE Access, 9, 48185-48196.
[48] Hussain, K., Hussain, S. J., Jhanjhi, N. Z., & Humayun, M. (2019, April). SYN flood attack
detection based on bayes estimator (SFADBE) for MANET. In 2019 International Conference
on Computer and Information Sciences (ICCIS) (pp. 1-4). IEEE.
[49] Humayun, M., Khalil, M. I., Almuayqil, S. N., & Jhanjhi, N. Z. (2023). Framework for
detecting breast cancer risk presence using deep learning. Electronics, 12(2), 403.
16
[50] Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., Humayun, M., Ibrahim, A. O., &
Abdelmaboud, A. (2022). A trust-based model for secure routing against RPL attacks in
internet of things. Sensors, 22(18), 7052.
[51] Kumar, V., Malik, N., Singla, J., Jhanjhi, N. Z., Amsaad, F., & Razaque, A. (2022).
Lightweight authentication scheme for smart home IoT devices. Cryptography, 6(3), 37.
[52] Sujatha, R., Chatterjee, J. M., Jhanjhi, N. Z., Tabbakh, T. A., & Almusaylim, Z. A. (2022).
Heart Failure Patient Survival Analysis with Multi Kernel Support Vector Machine. Intelligent
Automation & Soft Computing, 32(1).
[53] Iqbal, M. J., Iqbal, M. M., Ahmad, I., Ahmad, M., Jhanjhi, N. Z., Aljahdali, S., & Mushtaq,
M. (2021). Smart home automation using intelligent electricity dispatch. IEEE Access, 9,
118077-118086.
[54] Kaun, C., Jhanjhi, N. Z., Goh, W. W., & Sukumaran, S. (2021). Implementation of decision
tree algorithm to classify knowledge quality in a knowledge intensive system. In MATEC Web
of Conferences (Vol. 335, p. 04002). EDP Sciences.
[55] Hamid, M. A., Hafeez, Y., Hamid, B., Humayun, M., & Jhanjhi, N. Z. (2020). Towards an
effective approach for architectural knowledge management considering global software
development. International Journal of Grid and Utility Computing, 11(6), 780-791.
[56] Priyadarshini, I., Chatterjee, J. M., Sujatha, R., Jhanjhi, N., Karime, A., & Masud, M.
(2022). Exploring internet meme activity during COVID-19 lockdown using Artificial
Intelligence techniques. Applied Artificial Intelligence, 36(1), 2014218.
[57] Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., Hossain, M. S., & Yassine, A. (2022).
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors, 22(16),
6215.
[58] Basavaraju, P. H., Lokesh, G. H., Mohan, G., Jhanjhi, N. Z., & Flammini, F. (2022).
Statistical channel model and systematic random linear network coding based qos oriented
and energy efficient uwsn routing protocol. Electronics, 11(16), 2590.
[59] Muthukkumar, R., Garg, L., Maharajan, K., Jayalakshmi, M., Jhanjhi, N., Parthiban, S., &
Saritha, G. (2022). A genetic algorithm-based energy-aware multi-hop clustering scheme for
heterogeneous wireless sensor networks. PeerJ Computer Science, 8, e1029.
[60] Sharma, U., Nand, P., Chatterjee, J. M., Jain, V., Jhanjhi, N. Z., & Sujatha, R. (Eds.).
(2022). Cyber-Physical Systems: Foundations and Techniques. John Wiley & Sons.
[61] Anandan, R., Gopalakrishnan, S., Pal, S., & Zaman, N. (Eds.). (2022). Industrial Internet
of Things (IIoT): Intelligent Analytics for Predictive Maintenance. John Wiley & Sons.
[62] Zaman, N., Gaur, L., & Humayun, M. (Eds.). (2022). Approaches and Applications of Deep
Learning in Virtual Medical Care. IGI Global. https://doi.org/10.4018/978-1-7998-8929-8
[63] Gandam, A., Sidhu, J. S., Verma, S., Jhanjhi, N. Z., Nayyar, A., Abouhawwash, M., &
Nam, Y. (2021). An efficient post-processing adaptive filtering technique to rectifying the
flickering effects. PLoS One, 16(5), e0250959.
17
[64] Talwani, S., Singla, J., Mathur, G., Malik, N., Jhanjhi, N. Z., Masud, M., & Aljahdali, S.
(2022). Machine-Learning-Based Approach for Virtual Machine Allocation and Migration.
Electronics, 11(19), 3249.
[65] Muzammal, S. M., Murugesan, R. K., & Jhanjhi, N. Z. (2021, March). Introducing mobility
metrics in trust-based security of routing protocol for internet of things. In 2021 National
Computing Colleges Conference (NCCC) (pp. 1-5). IEEE.
[66] Hafeez, Y., Ali, S., Jhanjhi, N., Humayun, M., Nayyar, A., & Masud, M. (2021). Role of
Fuzzy Approach towards Fault Detection for Distributed Components. Computers, Materials
& Continua, 67(2).
[67] Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., & Abdullah, A. (2018, October). Middleware
power saving scheme for mobile applications. In 2018 Fourth International Conference on
Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
... Looking at the cost of change, as software is not released yet or even written yet, it is cheap to make modifications in its design or code. [1] As we are approaching the real product the cost of change significantly increases ( Figure 2). ...
Conference Paper
Full-text available
Software security is important for the business as well to cut costs on developed software issues responding process. That is why security testing is also considered an indispensable part that must be automated. Current approaches for security testing such as Static Application Security Testing and Dynamic Application Security Testing are widely used and have its own merits and demerits. The most significant demerits of Dynamic Testing are incompatibility with some application architectures and resource intensiveness for on-premises versions. To address the problem of efficient resource allocation and management an Auction-based bidding approach can be used. Despite the effectiveness of DAST implementation with such algorithms, it has its own disadvantages, such as complicated session management and limitation only for web-based applications.
Article
Full-text available
Cancer is a complicated global health concern with a significant fatality rate. Breast cancer is among the leading causes of mortality each year. Advancements in prognoses have been progressively based primarily on the expression of genes, offering insight into robust and appropriate healthcare decisions, owing to the fast growth of advanced throughput sequencing techniques and the use of various deep learning approaches that have arisen in the past few years. Diagnostic-imaging disease indicators such as breast density and tissue texture are widely used by physicians and automated technology. The effective and specific identification of cancer risk presence can be used to inform tailored screening and preventive decisions. For several classifications and prediction applications, such as breast imaging, deep learning has increasingly emerged as an effective method. We present a deep learning model approach for predicting breast cancer risk primarily on this foundation. The proposed methodology is based on transfer learning using the InceptionResNetV2 deep learning model. Our experimental work on a breast cancer dataset demonstrates high model performance, with 91% accuracy. The proposed model includes risk markers that are used to improve breast cancer risk assessment scores and presents promising results compared to existing approaches. Deep learning models include risk markers that are used to improve accuracy scores. This article depicts breast cancer risk indicators, defines the proper usage, features, and limits of each risk forecasting model, and examines the increasing role of deep learning (DL) in risk detection. The proposed model could potentially be used to automate various types of medical imaging techniques.
Article
Full-text available
Due to its ability to supply reliable, robust and scalable computational power, cloud computing is becoming increasingly popular in industry, government, and academia. High-speed networks connect both virtual and real machines in cloud computing data centres. The system’s dynamic provisioning environment depends on the requirements of end-user computer resources. Hence, the operational costs of a particular data center are relatively high. To meet service level agreements (SLAs), it is essential to assign an appropriate maximum number of resources. Virtualization is a fundamental technology used in cloud computing. It assists cloud providers to manage data centre resources effectively, and, hence, improves resource usage by creating several virtualmachine (VM) instances. Furthermore, VMs can be dynamically integrated into a few physical nodes based on current resource requirements using live migration, while meeting SLAs. As a result, unoptimised and inefficient VM consolidation can reduce performance when an application is exposed to varying workloads. This paper introduces a new machine-learning-based approach for dynamically integrating VMs based on adaptive predictions of usage thresholds to achieve acceptable service level agreement (SLAs) standards. Dynamic data was generated during runtime to validate the efficiency of the proposed technique compared with other machine learning algorithms.
Article
Full-text available
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes’ mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
Article
Full-text available
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security is easy to adapt for resource-constrained IoT environments. In the existing trust-based security for RPL routing attacks, nodes’ mobility is not considered or limited to only the sender nodes. Similarly, these trust-based protocols are not evaluated for mobile IoT environments, particularly regarding RPL attacks. Hence, a trust and mobility-based secure routing protocol is proposed, termed as SMTrust, by critically analysing the trust metrics involving the mobility-based metrics in IoT. SMTrust intends to provide security against RPL Rank and Blackhole attacks. The proposed protocol is evaluated in three different scenarios, including static and mobile nodes in an IoT network. SMTrust is compared with the default RPL objective function, Minimum Rank with Hysteresis Objective Function (MRHOF), SecTrust, DCTM, and MRTS. The evaluation results indicate that the proposed protocol outperforms with respect to packet loss rate, throughput, and topology stability. Moreover, SMTrust is validated using routing protocol requirements analysis to ensure that it fulfils the consistency, optimality, and loop-freeness.
Article
Full-text available
Background The energy-constrained heterogeneous nodes are the most challenging wireless sensor networks (WSNs) for developing energy-aware clustering schemes. Although various clustering approaches are proven to minimise energy consumption and delay and extend the network lifetime by selecting optimum cluster heads (CHs), it is still a crucial challenge. Methods This article proposes a genetic algorithm-based energy-aware multi-hop clustering (GA-EMC) scheme for heterogeneous WSNs (HWSNs). In HWSNs, all the nodes have varying initial energy and typically have an energy consumption restriction. A genetic algorithm determines the optimal CHs and their positions in the network. The fitness of chromosomes is calculated in terms of distance, optimal CHs, and the node's residual energy. Multi-hop communication improves energy efficiency in HWSNs. The areas near the sink are deployed with more supernodes far away from the sink to solve the hot spot problem in WSNs near the sink node. Results Simulation results proclaim that the GA-EMC scheme achieves a more extended network lifetime network stability and minimises delay than existing approaches in heterogeneous nature.
Article
Full-text available
In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User authentication can be performed using some password or biometric technique. However, when it comes to authenticating a device, it becomes challenging to maintain data security over a secure network such as the Internet. Many encryptions and decryption algorithms assert confidentiality, and hash code or message authentication code MAC is used for authentication. Traditional cryptographic security methods are expensive in terms of computational resources such as memory, processing capacity, and power consumption. They are incompatible with the Internet of Things devices that have limited resources. Although automatic Device-to-Device communication enables new potential applications, the limited resources of the networks’ machines and devices impose various constraints. This paper proposes a home device authentication scheme when these are accessed from a remote place. An authentication device is used for the home network and controller device to control home appliances. Our scheme can prevent various attacks such as replay attacks, server spoofing, and man-in-the-middle attack. The proposed scheme maintains the confidentiality and authenticity of the user and devices in the network. At the same time, we check the system in a simulated environment, and the results show that the network’s performance does not degrade much in terms of delay, throughput, and energy consumed.
Article
Full-text available
The sudden outbreak of the novel coronavirus (nCoV-19, COVID-19) and its rampant spread led to a significant number of people being infected worldwide and disrupted several businesses. With most of the countries imposing serious lockdowns due to the increasing number of fatalities, the social lives of millions of people were affected. Although the lockdown led to an increase in network activities, online shopping, and social network usage, it also raised questions On the mental wellness of society. Interestingly, excessive usage of social networks also witnessed humor traveling across the Internet in the form of Internet Memes during the lockdown period. Humor is known to affect our well-being, decision-making, and psychological systems. In this paper, we have analyzed the Internet Meme activity in Social Networks during the COVID-19 Lockdown period. As humor is known to relieve individuals from psychological stress, it is necessary to understand how human beings adopted Internet Memes for coping up with the lockdown stress and stress-relieving mechanism during the lockdown period. In this paper, we have considered thirty popular memes and the increase in the number of their captions within the period (September 2017 to August 2020). An increase in Internet Meme activity since the lockdown period (March 2020) depicts an increase in online social behavior. We analyze the internet meme activity in social networks during the COVID-19 lockdown period using random forest, multi-layer perceptron, and instance-based learning algorithms followed by data visualization using line graph and Heat Map (8 & 15 clustered). We also compared the performance of the models using evaluation parameters like mean absolute error, root-mean-squared error & Kappa statistics and observed that random forest and instance-based learning algorithms perform better than multi-layer perceptrons. The result indicates that random forest and instance-based learning classifiers are having near perfect classification tendencies whereas multi-layer perceptrons showed around 97% classification accuracy.
Article
Full-text available
The evolution of technology has increased the consumption of electric power locally and globally which lead to a dramatic increase in demand for electric power. Electricity consumption rate in different forms at home and commercially increased. Sometimes, it affects household appliances due to the raised demands based on conditions of load shedding, electricity shortfall, and emergencies. It includes sudden electricity breakdown due to heavy rainfall or storm. This study investigates the adaptation of an optimal solution for the usage of energy to meet a revolutionary change. A technique is proposed that will address the issues regarding electric power shortfall and emergencies caused by the sudden breakthrough of electricity. The proposed technique automates the appliances in three main ways, a) locally automation, b) web-based, c) app-based automation. Using a microcontroller, appliances are locally controlled. By using a web page or application, the appliances are controlled remotely. This work helps in saving energy by automatic or manual switching of appliances on and off according to need through the web or apps. Experimental results show that the average accuracy of the system for local scenarios is 88.71, for web-based scenarios is 88.55 and for app-based is 88.56 respectively. It also handles emergency situations by calculating the load and perform smart switching, so that devices may remain safe even in abnormal situations like low or high voltages.
Book
he recent advancements in the machine learning paradigm have various applications, specifically in the field of medical data analysis. Research has proven the high accuracy of deep learning algorithms, and they have become a standard choice for analyzing medical data, especially medical images, video, and electronic health records. Deep learning methods applied to electronic health records are contributing to understanding the evolution of chronic diseases and predicting the risk of developing those diseases. Approaches and Applications of Deep Learning in Virtual Medical Care considers the applications of deep learning in virtual medical care and delves into complex deep learning algorithms, calibrates models, and improves the predictions of the trained model on medical imaging. Covering topics such as big data and medical sensors, this critical reference source is ideal for researchers, academicians, practitioners, industry professionals, hospital workers, scholars, instructors, and students.