Alert button
Picture for Muhammed Fatih Bulut

Muhammed Fatih Bulut

Alert button

Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Jun 27, 2023
Asif Imran, Tevfik Kosar, Jaroslaw Zola, Muhammed Fatih Bulut

Figure 1 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 2 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 3 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 4 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Automated batch refactoring has become a de-facto mechanism to restructure software that may have significant design flaws negatively impacting the code quality and maintainability. Although automated batch refactoring techniques are known to significantly improve overall software quality and maintainability, their impact on resource utilization is not well studied. This paper aims to bridge the gap between batch refactoring code smells and consumption of resources. It determines the relationship between software code smell batch refactoring, and resource consumption. Next, it aims to design algorithms to predict the impact of code smell refactoring on resource consumption. This paper investigates 16 code smell types and their joint effect on resource utilization for 31 open source applications. It provides a detailed empirical analysis of the change in application CPU and memory utilization after refactoring specific code smells in isolation and in batches. This analysis is then used to train regression algorithms to predict the impact of batch refactoring on CPU and memory utilization before making any refactoring decisions. Experimental results also show that our ANN-based regression model provides highly accurate predictions for the impact of batch refactoring on resource consumption. It allows the software developers to intelligently decide which code smells they should refactor jointly to achieve high code quality and maintainability without increasing the application resource utilization. This paper responds to the important and urgent need of software engineers across a broad range of software applications, who are looking to refactor code smells and at the same time improve resource consumption. Finally, it brings forward the concept of resource aware code smell refactoring to the most crucial software applications.

Viaarxiv icon

Automated Compliance Blueprint Optimization with Artificial Intelligence

Jun 22, 2022
Abdulhamid Adebayo, Daby Sow, Muhammed Fatih Bulut

Figure 1 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 2 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 3 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 4 for Automated Compliance Blueprint Optimization with Artificial Intelligence

For highly regulated industries such as banking and healthcare, one of the major hindrances to the adoption of cloud computing is compliance with regulatory standards. This is a complex problem due to many regulatory and technical specification (techspec) documents that the companies need to comply with. The critical problem is to establish the mapping between techspecs and regulation controls so that from day one, companies can comply with regulations with minimal effort. We demonstrate the practicality of an approach to automatically analyze regulatory standards using Artificial Intelligence (AI) techniques. We present early results to identify the mapping between techspecs and regulation controls, and discuss challenges that must be overcome for this solution to be fully practical.

* 5 pages 
Viaarxiv icon

Vulnerability Prioritization: An Offensive Security Approach

Jun 22, 2022
Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek

Figure 1 for Vulnerability Prioritization: An Offensive Security Approach
Figure 2 for Vulnerability Prioritization: An Offensive Security Approach
Figure 3 for Vulnerability Prioritization: An Offensive Security Approach
Figure 4 for Vulnerability Prioritization: An Offensive Security Approach

Organizations struggle to handle sheer number of vulnerabilities in their cloud environments. The de facto methodology used for prioritizing vulnerabilities is to use Common Vulnerability Scoring System (CVSS). However, CVSS has inherent limitations that makes it not ideal for prioritization. In this work, we propose a new way of prioritizing vulnerabilities. Our approach is inspired by how offensive security practitioners perform penetration testing. We evaluate our approach with a real world case study for a large client, and the accuracy of machine learning to automate the process end to end.

* 5 pages 
Viaarxiv icon

Attack Techniques and Threat Identification for Vulnerabilities

Jun 22, 2022
Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta

Figure 1 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 2 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 3 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 4 for Attack Techniques and Threat Identification for Vulnerabilities

Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vulnerabilities, but also to gain insights into attackers' perspectives. In this work, we use machine learning and natural language processing techniques, as well as several publicly available data sets to provide an explainable mapping of vulnerabilities to attack techniques and threat actors. This work provides new security intelligence, by predicting which attack techniques are most likely to be used to exploit a given vulnerability and which threat actors are most likely to conduct the exploitation. Lack of labeled data and different vocabularies make mapping vulnerabilities to attack techniques at scale a challenging problem that cannot be addressed easily using supervised or unsupervised (similarity search) learning techniques. To solve this problem, we first map the vulnerabilities to a standard set of common weaknesses, and then common weaknesses to the attack techniques. This approach yields a Mean Reciprocal Rank (MRR) of 0.95, an accuracy comparable with those reported for state-of-the-art systems. Our solution has been deployed to IBM Security X-Force Red Vulnerability Management Services, and in production since 2021. The solution helps security practitioners to assist customers to manage and prioritize their vulnerabilities, providing them with an explainable mapping of vulnerabilities to attack techniques and threat actors

* 9 pages 
Viaarxiv icon