Skip to main content

Advertisement

Log in

Security assessment of operating system by using decision making algorithms

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Decision-making is the most important phenomenon of selectivity in the given set of factors. Operating System (OS) security is profoundly reliant upon different factors, affecting the security of OS. The OS securities in various devices are the fundamental goal of present evaluation. The identification and estimation of OS security factors are necessary and challenging in the design of OS. Security appraisal is an essential piece of chance administration rehearsal that gives a scientific instrument to coordinate and control security factors for the assessment in design stage. The goal of this examination study is to create a secure OS with controlled intricacy. The planning of a secure OS and the consequence of security factors are taken. The assessment of OS security is utilizing the Fuzzy Preference Ranking Organization Method for Enrichment Evaluation (F-Promethee II) method investigating OS security design. Fuzzy set speculations are the most suitable for the devices to give results for demonstrating subjective data. The F-Promethee II technique is used for the assessment. This technique evaluates the impact of OS security factors. Hence, the security assessment of OS is in the hierarchical data security. Initially, five prior factors at the level are distinguished. These elements are arranged in two level confidentiality, integrity, availability, human trust, and authentication at level one. At level two Denial of service attack, network intrusion, buffer overflow, authentication measure, and vulnerability. Authentication got the top rank and authorization least in the security estimation of OS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Silberschatz A, Peterson JL, Galvin PB (1991) Operating system concepts, 3rd edn. Addison-Wesley Longman Publishing Co., Inc., Boston

    Google Scholar 

  2. Jaeger T (2022) Operating system security. Springer, Cham

    Google Scholar 

  3. Klein G (2009) Operating system verification—an overview. Sadhana 34:27–69. https://doi.org/10.1007/s12046-009-0002-4

    Article  MathSciNet  Google Scholar 

  4. Muttoo SK, Badhani S (2017) Android malware detection: state of the art. Int J Inf Technol 9(1):111–117. https://doi.org/10.1007/S41870-017-0010-2/METRICS

    Article  Google Scholar 

  5. Tank D, Aggarwal A, Chaubey N (2022) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 14(2):847–862. https://doi.org/10.1007/S41870-019-00294-X/METRICS

    Article  Google Scholar 

  6. Patel ND, Mehtre BM, Wankar R (2023) Od-ids2022: generating a new offensive defensive intrusion detection dataset for machine learning-based attack classification. Int J Inf Technol 15:4349–4363. https://doi.org/10.1007/S41870-023-01464-8/METRICS

    Article  Google Scholar 

  7. Oshri I, Kotlarsky J, Hirsch C (2007) Information security in networkable Windows-based operating system devices: challenges and solutions. Comput Secur 26:177–182. https://doi.org/10.1109/MSP.2007.104

    Article  Google Scholar 

  8. Zou Y, Schaub F (2018) Concern but no action: consumers’ reactions to the equifax data breach. In Conf. Hum. Factors Comput. Syst. - Proc., vol. 2018. doi: https://doi.org/10.1145/3170427.3188510

  9. Keim Y, Mohapatra AK (2022) Cyber threat intelligence framework using advanced malware forensics. Int J Inf Technol 14(1):521–530. https://doi.org/10.1007/s41870-019-00280-3

    Article  Google Scholar 

  10. Novak AN, Vilceanu MO (2019) ‘The internet is not pleased’: twitter and the 2017 Equifax data breach. Commun Rev 22(3):196–221. https://doi.org/10.1080/10714421.2019.1651595

    Article  Google Scholar 

  11. Mistry NR, Dahiya MS (2019) Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks. Int J Inf Technol 11(3):583–589. https://doi.org/10.1007/s41870-018-0263-4

    Article  Google Scholar 

  12. Iqbal J, Firdous T, Shrivastava AK, Saraf I (2022) Modelling and predicting software vulnerabilities using a sigmoid function. Int J Inf Technol 14(2):649–655. https://doi.org/10.1007/s41870-021-00844-2

    Article  Google Scholar 

  13. Linden TA (1976) Operating system structures to support security and reliable software. ACM Comput Surv 8(4):409–445. https://doi.org/10.1145/356678.356682

    Article  Google Scholar 

  14. Kaur J, Reddy SRN (2018) Operating systems for low-end smart devices: a survey and a proposed solution framework. Int J Inf Technol 10(1):49–58. https://doi.org/10.1007/S41870-017-0044-5/METRICS

    Article  Google Scholar 

  15. Li DJ, Wang H, Tang XK, Yang LX, Shen CF, Xiao K (2022) Secure trusted operating system based on microkernel architecture. Lect Notes Networks Syst 216:173–188. https://doi.org/10.1007/978-981-16-1781-2_17/COVER

    Article  Google Scholar 

  16. Renjith G, Aji S (2022) Unveiling the Security Vulnerabilities in Android Operating System BT - Proceedings of Second International Conference on Sustainable Expert Systems, pp. 89–100

  17. Sreerag M, Sethumadhavan M, Amritha PP (2022) Identifying and mitigating vulnerabilities of hardened windows operating system. Lect Notes Networks Syst 191:623–632. https://doi.org/10.1007/978-981-16-0739-4_59/COVER

    Article  Google Scholar 

  18. Pecholt J, Huber M, Wessel S (2021) Live migration of operating system containers in encrypted virtual machines. In CCSW 2021 - Proc. 2021 Cloud Comput. Secur. Work. co-located with CCS 2021, pp. 125–137. doi: https://doi.org/10.1145/3474123.3486761

  19. Iqbal S (2021) A study on UAV operating system security and future research challenges. In 2021 IEEE 11th Annu Comput Commun Work Conf CCWC 2021, pp. 759–765. doi: https://doi.org/10.1109/CCWC51732.2021.9376151

  20. Khan SA, Nadeem M, Agrawal A, Khan RA, Kumar R (2021) Quantitative analysis of software security through fuzzy promethee-ii methodology: a design perspective. Int J Mod Educ Comput Sci 13(6):30–41. https://doi.org/10.5815/ijmecs.2021.06.04

    Article  Google Scholar 

  21. Vinodh S, Jeya Girubha R (2012) PROMETHEE based sustainable concept selection. Appl Math Model 36(11):5301–5308. https://doi.org/10.1016/J.APM.2011.12.030

    Article  MathSciNet  Google Scholar 

  22. Mukhametzyanov I, Pamucar D (2018) A sensitivity analysis in MCDM problems: a statistical approach. Decis Mak Appl Manag Eng 1(2):51–80. https://doi.org/10.31181/DMAME1802050M

    Article  Google Scholar 

  23. Kumar S, Das S (2021) An open source and practical approach to X2X linux workload migration. Int J Inf Technol 13(5):1791–1796. https://doi.org/10.1007/S41870-021-00754-3/METRICS

    Article  Google Scholar 

  24. Mir SQ, Quadri SMK (2019) Component based metric for evaluating availability of an information system: an empirical evaluation. Int J Inf Technol 11(2):277–285. https://doi.org/10.1007/s41870-018-0220-2

    Article  Google Scholar 

  25. Nadeem M et al (2022) Multi-level hesitant fuzzy based model for usable-security assessment. Intell Autom Soft Comput 31(1):61. https://doi.org/10.32604/IASC.2022.019624

    Article  Google Scholar 

  26. Alharbi A et al (2021) Managing software security risks through an integrated computational method. Intell Autom Soft Comput 28(1):179. https://doi.org/10.32604/IASC.2021.016646

    Article  Google Scholar 

  27. Alzahrani FA, Ahmad M, Nadeem M, Kumar R, Khan RA (2021) Integrity assessment of medical devices for improving hospital services. Comput Mater Contin 67(3):3619. https://doi.org/10.32604/CMC.2021.014869

    Article  Google Scholar 

  28. Alyami H et al (2021) The evaluation of software security through quantum computing techniques: a durability perspective. Appl Sci 11(24):11784. https://doi.org/10.3390/app112411784

    Article  Google Scholar 

  29. Aryan, Kumar C, Raj Vincent DPM (2017) Enhanced Diffie-Hellman algorithm for reliable key exchange. IOP Conf Ser Mater Sci Eng 263(4):042015. https://doi.org/10.1088/1757-899X/263/4/042015

    Article  Google Scholar 

  30. Pandey SK, Mustafa K (2012) Security assurance by efficient non-repudiation requirements. Adv Intell Soft Comput 167(2):905–912. https://doi.org/10.1007/978-3-642-30111-7_87/COVER

    Article  Google Scholar 

  31. Sun J, Liu C, Liu N (2018) Data-driven adaptive critic approach for nonlinear optimal control via least squares support vector machine. Asian J Control 20(1):104–114. https://doi.org/10.1002/ASJC.1517

    Article  MathSciNet  Google Scholar 

  32. Bansod S, Ragha L (2022) Challenges in making blockchain privacy compliant for the digital world: some measures. Sadhana - Acad Proc Eng Sci 47(3):1–17. https://doi.org/10.1007/S12046-022-01931-1/FIGURES/9

    Article  Google Scholar 

  33. Madhavi S, Udhaya Sankar SM, Praveen R, Jagadish Kumar N (2023) A fuzzy COPRAS-based decision-making framework for mitigating the impact of vampire sensor nodes in wireless sensor nodes (WSNs). Int J Inf Technol 15(4):1859–1870. https://doi.org/10.1007/S41870-023-01219-5/METRICS

    Article  Google Scholar 

  34. Ahmed HMM, Kamel AAEAA (2023) A university leader selection novel intelligent system based on Fuzzy-AHP and PROMETTEE II. Int J Inf Technol 15(7):3857–3871. https://doi.org/10.1007/S41870-023-01344-1/METRICS

    Article  Google Scholar 

  35. Udhaya Sankar SM, Praveen R, Jagadish Kumar N, Jagatheswari S (2023) Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs. Int J Inf Technol 15(4):1985–1998. https://doi.org/10.1007/S41870-023-01251-5/METRICS

    Article  Google Scholar 

  36. van Laarhoven PJM, Pedrycz W (1983) A fuzzy extension of Saaty’s priority theory. Fuzzy Sets Syst 11(1–3):229–241. https://doi.org/10.1016/S0165-0114(83)80082-7

    Article  MathSciNet  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the material preparation, data collection and analysis were performed by Prabhash Chandra Pathak, Mohd Nadeem and Syed Anas Ansar. The first draft of the manuscript was written by Mohd Nadeem and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Mohd Nadeem.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose. The authors have no competing interests to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pathak, P.C., Nadeem, M. & Ansar, S.A. Security assessment of operating system by using decision making algorithms. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-023-01706-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-023-01706-9

Keywords

Navigation