Abstract
Decision-making is the most important phenomenon of selectivity in the given set of factors. Operating System (OS) security is profoundly reliant upon different factors, affecting the security of OS. The OS securities in various devices are the fundamental goal of present evaluation. The identification and estimation of OS security factors are necessary and challenging in the design of OS. Security appraisal is an essential piece of chance administration rehearsal that gives a scientific instrument to coordinate and control security factors for the assessment in design stage. The goal of this examination study is to create a secure OS with controlled intricacy. The planning of a secure OS and the consequence of security factors are taken. The assessment of OS security is utilizing the Fuzzy Preference Ranking Organization Method for Enrichment Evaluation (F-Promethee II) method investigating OS security design. Fuzzy set speculations are the most suitable for the devices to give results for demonstrating subjective data. The F-Promethee II technique is used for the assessment. This technique evaluates the impact of OS security factors. Hence, the security assessment of OS is in the hierarchical data security. Initially, five prior factors at the level are distinguished. These elements are arranged in two level confidentiality, integrity, availability, human trust, and authentication at level one. At level two Denial of service attack, network intrusion, buffer overflow, authentication measure, and vulnerability. Authentication got the top rank and authorization least in the security estimation of OS.
Similar content being viewed by others
Data availability
Not applicable.
References
Silberschatz A, Peterson JL, Galvin PB (1991) Operating system concepts, 3rd edn. Addison-Wesley Longman Publishing Co., Inc., Boston
Jaeger T (2022) Operating system security. Springer, Cham
Klein G (2009) Operating system verification—an overview. Sadhana 34:27–69. https://doi.org/10.1007/s12046-009-0002-4
Muttoo SK, Badhani S (2017) Android malware detection: state of the art. Int J Inf Technol 9(1):111–117. https://doi.org/10.1007/S41870-017-0010-2/METRICS
Tank D, Aggarwal A, Chaubey N (2022) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 14(2):847–862. https://doi.org/10.1007/S41870-019-00294-X/METRICS
Patel ND, Mehtre BM, Wankar R (2023) Od-ids2022: generating a new offensive defensive intrusion detection dataset for machine learning-based attack classification. Int J Inf Technol 15:4349–4363. https://doi.org/10.1007/S41870-023-01464-8/METRICS
Oshri I, Kotlarsky J, Hirsch C (2007) Information security in networkable Windows-based operating system devices: challenges and solutions. Comput Secur 26:177–182. https://doi.org/10.1109/MSP.2007.104
Zou Y, Schaub F (2018) Concern but no action: consumers’ reactions to the equifax data breach. In Conf. Hum. Factors Comput. Syst. - Proc., vol. 2018. doi: https://doi.org/10.1145/3170427.3188510
Keim Y, Mohapatra AK (2022) Cyber threat intelligence framework using advanced malware forensics. Int J Inf Technol 14(1):521–530. https://doi.org/10.1007/s41870-019-00280-3
Novak AN, Vilceanu MO (2019) ‘The internet is not pleased’: twitter and the 2017 Equifax data breach. Commun Rev 22(3):196–221. https://doi.org/10.1080/10714421.2019.1651595
Mistry NR, Dahiya MS (2019) Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks. Int J Inf Technol 11(3):583–589. https://doi.org/10.1007/s41870-018-0263-4
Iqbal J, Firdous T, Shrivastava AK, Saraf I (2022) Modelling and predicting software vulnerabilities using a sigmoid function. Int J Inf Technol 14(2):649–655. https://doi.org/10.1007/s41870-021-00844-2
Linden TA (1976) Operating system structures to support security and reliable software. ACM Comput Surv 8(4):409–445. https://doi.org/10.1145/356678.356682
Kaur J, Reddy SRN (2018) Operating systems for low-end smart devices: a survey and a proposed solution framework. Int J Inf Technol 10(1):49–58. https://doi.org/10.1007/S41870-017-0044-5/METRICS
Li DJ, Wang H, Tang XK, Yang LX, Shen CF, Xiao K (2022) Secure trusted operating system based on microkernel architecture. Lect Notes Networks Syst 216:173–188. https://doi.org/10.1007/978-981-16-1781-2_17/COVER
Renjith G, Aji S (2022) Unveiling the Security Vulnerabilities in Android Operating System BT - Proceedings of Second International Conference on Sustainable Expert Systems, pp. 89–100
Sreerag M, Sethumadhavan M, Amritha PP (2022) Identifying and mitigating vulnerabilities of hardened windows operating system. Lect Notes Networks Syst 191:623–632. https://doi.org/10.1007/978-981-16-0739-4_59/COVER
Pecholt J, Huber M, Wessel S (2021) Live migration of operating system containers in encrypted virtual machines. In CCSW 2021 - Proc. 2021 Cloud Comput. Secur. Work. co-located with CCS 2021, pp. 125–137. doi: https://doi.org/10.1145/3474123.3486761
Iqbal S (2021) A study on UAV operating system security and future research challenges. In 2021 IEEE 11th Annu Comput Commun Work Conf CCWC 2021, pp. 759–765. doi: https://doi.org/10.1109/CCWC51732.2021.9376151
Khan SA, Nadeem M, Agrawal A, Khan RA, Kumar R (2021) Quantitative analysis of software security through fuzzy promethee-ii methodology: a design perspective. Int J Mod Educ Comput Sci 13(6):30–41. https://doi.org/10.5815/ijmecs.2021.06.04
Vinodh S, Jeya Girubha R (2012) PROMETHEE based sustainable concept selection. Appl Math Model 36(11):5301–5308. https://doi.org/10.1016/J.APM.2011.12.030
Mukhametzyanov I, Pamucar D (2018) A sensitivity analysis in MCDM problems: a statistical approach. Decis Mak Appl Manag Eng 1(2):51–80. https://doi.org/10.31181/DMAME1802050M
Kumar S, Das S (2021) An open source and practical approach to X2X linux workload migration. Int J Inf Technol 13(5):1791–1796. https://doi.org/10.1007/S41870-021-00754-3/METRICS
Mir SQ, Quadri SMK (2019) Component based metric for evaluating availability of an information system: an empirical evaluation. Int J Inf Technol 11(2):277–285. https://doi.org/10.1007/s41870-018-0220-2
Nadeem M et al (2022) Multi-level hesitant fuzzy based model for usable-security assessment. Intell Autom Soft Comput 31(1):61. https://doi.org/10.32604/IASC.2022.019624
Alharbi A et al (2021) Managing software security risks through an integrated computational method. Intell Autom Soft Comput 28(1):179. https://doi.org/10.32604/IASC.2021.016646
Alzahrani FA, Ahmad M, Nadeem M, Kumar R, Khan RA (2021) Integrity assessment of medical devices for improving hospital services. Comput Mater Contin 67(3):3619. https://doi.org/10.32604/CMC.2021.014869
Alyami H et al (2021) The evaluation of software security through quantum computing techniques: a durability perspective. Appl Sci 11(24):11784. https://doi.org/10.3390/app112411784
Aryan, Kumar C, Raj Vincent DPM (2017) Enhanced Diffie-Hellman algorithm for reliable key exchange. IOP Conf Ser Mater Sci Eng 263(4):042015. https://doi.org/10.1088/1757-899X/263/4/042015
Pandey SK, Mustafa K (2012) Security assurance by efficient non-repudiation requirements. Adv Intell Soft Comput 167(2):905–912. https://doi.org/10.1007/978-3-642-30111-7_87/COVER
Sun J, Liu C, Liu N (2018) Data-driven adaptive critic approach for nonlinear optimal control via least squares support vector machine. Asian J Control 20(1):104–114. https://doi.org/10.1002/ASJC.1517
Bansod S, Ragha L (2022) Challenges in making blockchain privacy compliant for the digital world: some measures. Sadhana - Acad Proc Eng Sci 47(3):1–17. https://doi.org/10.1007/S12046-022-01931-1/FIGURES/9
Madhavi S, Udhaya Sankar SM, Praveen R, Jagadish Kumar N (2023) A fuzzy COPRAS-based decision-making framework for mitigating the impact of vampire sensor nodes in wireless sensor nodes (WSNs). Int J Inf Technol 15(4):1859–1870. https://doi.org/10.1007/S41870-023-01219-5/METRICS
Ahmed HMM, Kamel AAEAA (2023) A university leader selection novel intelligent system based on Fuzzy-AHP and PROMETTEE II. Int J Inf Technol 15(7):3857–3871. https://doi.org/10.1007/S41870-023-01344-1/METRICS
Udhaya Sankar SM, Praveen R, Jagadish Kumar N, Jagatheswari S (2023) Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs. Int J Inf Technol 15(4):1985–1998. https://doi.org/10.1007/S41870-023-01251-5/METRICS
van Laarhoven PJM, Pedrycz W (1983) A fuzzy extension of Saaty’s priority theory. Fuzzy Sets Syst 11(1–3):229–241. https://doi.org/10.1016/S0165-0114(83)80082-7
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
All authors contributed to the material preparation, data collection and analysis were performed by Prabhash Chandra Pathak, Mohd Nadeem and Syed Anas Ansar. The first draft of the manuscript was written by Mohd Nadeem and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose. The authors have no competing interests to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Pathak, P.C., Nadeem, M. & Ansar, S.A. Security assessment of operating system by using decision making algorithms. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-023-01706-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-023-01706-9