Skip to main content

Application of Computer Network Security Technology in Software Development

  • Conference paper
  • First Online:
Cyber Security Intelligence and Analytics (CSIA 2023)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 173))

  • 349 Accesses

Abstract

Computer plays an important role in human life and work, and the popularization of computer education level is more closely related to the overall strength of the country. Software development is an important factor to improve the level of the computer. At the same time, the application of software security technology is also an important way to ensure the normal operation of the computer. This requires paying attention to the specific application of security technology in software development computers. The purpose of this paper is to investigate the technical problems of computer security software development. This work provides an overview of the dynamic data reliability images, based on interactions within the data during software development. The algorithm can be applied to various stages of the software version to protect the copyright of the software. The test in this paper shows that the average correction rate reaches about 40% in open source projects, and the software can also run safely during normal use. It has an excellent ability to resist various cyber-attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. David, A., Xavier, B., Dolors, C., et al.: Non-functional requirements in model-driven development of service-oriented architectures. Sci. Comput. Program. 168(DEC.15), 18–37 (2018)

    Google Scholar 

  2. Zhao, Y., Yang, Z., Ma, D.: A survey on formal specification and verification of separation kernels. Front. Comput. Sci. China. 11(4), 585–607 (2017)

    Google Scholar 

  3. Gardner, Z., Philippa, S.: Verified trustworthy software systems. Philos. Trans. R. Soc. A. Math. Phys. Eng. Sci. 375(2104), 20150408 (2017)

    Google Scholar 

  4. Ibrahim, J., Zhu, J., Hanif, S., Shafiq, S., et al.: Emerging trends in software testing tools & methodologies: a review.Int. J. Comput. Sci. Inf. Secur. 17(7), 108–112 (2019)

    Google Scholar 

  5. Ateoullar, D., Mishra, A.: Automation testing tools: a comparative view. Int. J. Inf. Comput. Secur. 12(4), 63–76 (2020)

    Google Scholar 

  6. Agrawal, A., Zarour, M., Alenezi, M., et al.: Security durability assessment through fuzzy analytic hierarchy process. Peer J. Comput. Sci. 5(5), e215 (2019)

    Google Scholar 

  7. Jafari, A.J., Rasoolzadegan, A.: Security patterns: a systematic mapping study. J. Comput. Lang. 56, 100938 (2020)

    Article  Google Scholar 

  8. Vidas, T., Larsen, P., Okhravi, H., et al.: Changing the game of software security. IEEE Secur. Priv. 16(2), 10–11 (2018)

    Article  Google Scholar 

  9. Belinda, B.I., Emmanuel, A.A., Solomon, N., et al.: Evaluating software quality attributes using analytic hierarchy process (AHP). Int. J. Adv. Comput. Sci. Appl. 12(3), 165–173 (2021)

    Google Scholar 

  10. Meldrum, S., Licorish, S.A., Owen, C.A., et al.: Understanding stack overflow code quality: a recommendation of caution. Sci. Comput. Program. 199, 102516 (2020)

    Article  Google Scholar 

  11. Jj, A., Jyl, B., Ys, A.: A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code - ScienceDirect. Fut. Gener. Comput. Syst. 100, 1044–1052 (2019)

    Google Scholar 

  12. Devi, T.R., Rama, B.: Software reusability development through NFL approach for identifying security based inner relationships of affecting factors. Int. J. Elect. Comput. Eng. 10(1), 333 (2020)

    Google Scholar 

Download references

Acknowledgment

Supported by Sichuan Science and Technology Program, NO: 22ZDYF2965.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min Xian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xian, M., Zheng, X., Ye, X. (2023). Application of Computer Network Security Technology in Software Development. In: Xu, Z., Alrabaee, S., Loyola-González, O., Cahyani, N.D.W., Ab Rahman, N.H. (eds) Cyber Security Intelligence and Analytics. CSIA 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 173. Springer, Cham. https://doi.org/10.1007/978-3-031-31775-0_13

Download citation

Publish with us

Policies and ethics