Secure Software Development: An AI-Enhanced Threat Modelling Life Cycle
DOI:
https://doi.org/10.58213/vidhyayana.v10isi3.2228Keywords:
Threat Modelling, Secure Software DevelopmentAbstract
The rapid evolution of Artificial Intelligence (AI) technologies has significantly impacted various industrial sectors, transforming traditional practices into more efficient, intelligent processes. This research explores the adoption of AI within the Software Development Life Cycle (SDLC), aiming to enhance productivity, reduce errors, and improve overall software quality. By investigating AI integration at each stage of the SDLC from requirements gathering to maintenance this study aims to identify best practices, methodologies, and tools that can enable software teams to leverage AI effectively. The findings will be substantiated through a series of case studies and empirical analysis of existing AI implementations in software engineering, providing insights into the practical benefits and challenges faced during integration. Ultimately, this research strives to propose a comprehensive framework for successful AI adoption in SDLC, contributing to the advancement of software engineering practices in the digital age.
Downloads
References
M. L. C. Wu, Y. W. Wong, and D. H. Tsang, "Threat modeling: An empirical study of its application in security assurance," IEEE Transactions on Software Engineering, vol. 48, no. 1, pp. 59-77, Jan. 2022. [Online]. Available: https://ieeexplore.ieee.org/document/9395012
M. Ammar, N. Malik, and S. Malik, "AI-driven threat intelligence and proactive defense for modern software development," Computers & Security, vol. 117, pp. 102701, May 2023. [Online]. Available: https://doi.org/10.1016/j.cose.2023.102701
S. R. Chavan and P. D. Meshram, "Machine learning algorithms in cybersecurity: A comprehensive survey," Journal of Network and Computer Applications, vol. 196, pp. 103368, Dec. 2023. [Online]. Available: https://doi.org/10.1016/j.jnca.2023.103368
Rumana Anjum, Madhu B K, “Artificial Intelligence based Software Testing” International Journal for Research in Engineering Application & Management (IJREAM), ISSN: 2454-9150, Vol-07, Issue-02, May 2021
D. G. Firesmith, "Threat modeling: Designing for security," IEEE Software, vol. 39, no. 4, pp. 55-61, Jul. 2022. [Online]. Available: https://ieeexplore.ieee.org/document/9745892
H. S. Lee, S. J. Park, and J. H. Kim, "AI-enhanced automated testing for large-scale software systems," Journal of Systems and Software, vol. 194, pp. 111451, Jun. 2023. [Online]. Available: https://doi.org/10.1016/j.jss.2023.111451
M. Conti, N. Dragoni, and V. Lesyk, "A survey of countermeasures for threat modeling using AI techniques," ACM Computing Surveys, vol. 55, no. 3, pp. 1-39, May 2023. [Online]. Available: https://dl.acm.org/doi/10.1145/3513443
T. R. Mitchell et al., "Integration of AI in threat modeling frameworks: A practical approach," Future Generation Computer Systems, vol. 151, pp. 721-734, Oct. 2023. [Online]. Available: https://doi.org/10.1016/j.future.2023.08.007
J. Y. Lin et al., "Artificial intelligence in software engineering: Emerging trends and practical applications," IEEE Access, vol. 10, pp. 98154-98172, Aug. 2023. [Online]. Available: https://ieeexplore.ieee.org/document/9901983
L. Kumar, A. Jain, and P. Rana, "AI-powered threat detection systems in software pipelines," Applied Soft Computing, vol. 138, pp. 110297, Oct. 2023. [Online]. Available: https://doi.org/10.1016/j.asoc.2023.110297
R. Davis and K. Singh, "Natural language processing for automated threat identification in software engineering," IEEE Transactions on Artificial Intelligence, vol. 4, no. 4, pp. 312-328, Dec. 2023. [Online]. Available: https://ieeexplore.ieee.org/document/10154389
C. Anwar and H. McCarthy, "A review of explainable AI techniques for threat modeling and security assurance," ACM Transactions on Cyber-Physical Systems, vol. 7, no. 4, pp. 1-24, Nov. 2023. [Online]. Available: https://dl.acm.org/doi/10.1145/3588690
J. Zhao, Z. Liu, and H. Huang, "Towards robust and scalable AI-based threat modeling," Pattern Recognition Letters, vol. 170, pp. 215-223, Sep. 2023. [Online]. Available: https://doi.org/10.1016/j.patrec.2023.05.010
A. Roy, "Ethical and security considerations in AI-driven threat modeling," Journal of Artificial Intelligence Research, vol. 76, pp. 345-364, Oct. 2023. [Online]. Available: https://doi.org/10.1613/jair.4225