Intelligent method for supporting decision-making on software security using hybrid models

Authors

DOI:

https://doi.org/10.30837/2522-9818.2025.1.115

Keywords:

software security; deep neural networks; gradient boosting; machine learning; hybrid models; automated security analysis; cybersecurity; vulnerability detection.

Abstract

Objective. The research is aimed at developing an intelligent decision support method for software security assessment using a hybrid model based on deep learning and gradient boosting. The aim is to improve classification accuracy, interpretability and adaptability in the face of growing cyber threats. Methods. The proposed method combines deep neural networks for automated feature extraction and gradient boosting for final decision making. A classification module is built based on calculating the probabilities of software belonging to security classes. In addition, a geometric interpretation of the decision space is used with the calculation of the Euclidean distance to the reference classes (safe, unsafe, uncertain). The probabilities are normalized using the softmax function. The model was trained on a labeled dataset and tested using comparative metrics. Results. The developed prototype demonstrated improved performance compared to classical classification approaches. The experiments confirmed higher classification accuracy and clearer separation of security zones in the normalized feature space. The method effectively identifies cases requiring expert analysis and reduces the frequency of false positives. Visualization of the decision space increases the interpretability of the model results. Scientific novelty. We propose a hybrid intelligent method that integrates two modern machine learning approaches – deep neural networks and gradient boosting – into a single architecture for assessing software security. The decision space is formalized through probabilistic thresholds and geometric interpretation. Practical significance. The method can be used in secure software development processes to automatically assess the level of software security. It supports developers and cybersecurity specialists in identifying potentially dangerous modules at the early stages of the software life cycle. The approach can also be integrated into static analysis systems or CI/CD environments to improve security standards.

Author Biographies

Oksana Sitnikova, Private Institution "University of Science, Entrepreneurship and Technology"

PhD

Marharyta Melnyk, Private Institution "University of Science, Entrepreneurship and Technology"

PhD, Assistant Professor,

Olena Syrota, Private Institution "University of Science, Entrepreneurship and Technology"

PhD

Serhii Semenov, Private Institution "University of Science, Entrepreneurship and Technology"

Doctor of Sciences (Engineering), Professor

References

References

Madushan, H.; Salam, I.; Alawatugoda, J. (2022), "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses". Electronics,11, 4199 р. DOI: 10.3390/electronics11244199

Nikitenko, Andrii (2023), "Network intrusion detection systems based on deep learning neural networks". Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science. №2. Р. 15–21. DOI: 10.31474/1996-1588-2023-2-37-15-21

El-Hajj, M.; Mirza, Z.A. (2024), "ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool". Electronics, 13, 3910 р. DOI: https://doi.org/10.3390/electronics13193910

Fredj, Ouissem; Cheikhrouhou, Omar; Krichen, Moez; Hamam, Habib; Derhab, Abdelouahid (2021), "An OWASP Top Ten Driven Survey on Web Application Protection Methods". Lecture Notes in Computer Science, P. 235-252. DOI: 10.1007/978-3-030-68887-5_14

Mateo Tudela, F.; Bermejo Higuera, J.R.; Bermejo Higuera, J.; Sicilia Montalvo, J.A.; Argyros, M.I. (2020), "On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications". Appl. Sci., 10, 9119 р. DOI: 10.3390/app10249119

Kondraciuk, A., Bartos, A., & Pańczyk, B. (2022), "Comparative analysis of the effectiveness of OWASP ZAP, Burp Suite, Nikto and Skipfish in testing the security of web applications". Journal of Computer Sciences Institute, 24, Р. 176–180. DOI: 10.35784/jcsi.2929

Cao, W., Кosenko V., Semenov, S. (2022), "Study of the efficiency of the software security improving method and substantiation of practical recommendations for its use". Innovative technologies and scientific solutions for industries, 1 (19), Р. 55–64. DOI: 10.30837/ITSSI.2022.19.055

Aldyaflah, I.M.; Zhao, W.; Yang, S.; Luo, X. (2024), "The Impact of Input Types on Smart Contract Vulnerability Detection Performance Based on Deep Learning: A Preliminary Study". Information, 15, 302 р. DOI: 10.3390/info15060302

Alshehri, W.; Kammoun Jarraya, S.; Allinjawi, A. (2024), "Software Reliability Prediction Based on Recurrent Neural Network and Ensemble Method". Computers, 13, 335 р. DOI: 10.3390/computers13120335

Gavrylenko, S., Abdullin, O. (2024), "Improving the quality of payment fraud detection by using a combined approach of transaction analysis". Innovative technologies and scientific solutions for industries, 4(30), Р. 31–38. DOI: 10.30837/2522-9818.2024.4.031

Ullah, F.; Ullah, S.; Naeem, M.R.; Mostarda, L.; Rho, S.; Cheng, X. (2022), "Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation". Sensors, 22, 5883 р. DOI: 10.3390/s22155883

Zhang, S.; Chen, R.; Chen, J.; Zhu, Y.; Hua, M.; Yuan, J.; Xu, F. (2024), "L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification". Electronics, 13, 4222 р. DOI: 10.3390/electronics13214222

Romenskiy, V., Nevliudova, V., & Persiyanova, E. (2020), "Study of the operating time of the protective coating of surfaces of assembly and welding equipment". Innovative technologies and scientific solutions for industries, 1 (11), Р. 134–146. DOI: 10.30837/2522-9818.2020.11.134

Yeremenko, O., Yevdokymenko, M., Sleiman, B. (2020), "Advanced performance-based fast rerouting model with path protection and its bandwidth in software-defined network". Innovative technologies and scientific solutions for industries, 1 (11), Р. 163–171. DOI: 10.30837/2522-9818.2020.11.163

Gavrylenko, S., Poltoratskyi, V., Nechyporenko, A. (2024), "Intrusion detection model based on improved transformer". Advanced Information Systems, 8(1), Р. 94–99. DOI: 10.20998/2522-9052.2024.1.12

Moskalenko, V.; Kharchenko, V.; Semenov, S. (2024), "Model and Method for Providing Resilience to Resource-Constrained AI-System". Sensors, 24, 5951 р. DOI: 10.3390/s24185951

Published

2025-03-31

How to Cite

Sitnikova, O., Melnyk, M., Syrota, O., & Semenov, S. (2025). Intelligent method for supporting decision-making on software security using hybrid models. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (1(31), 115–126. https://doi.org/10.30837/2522-9818.2025.1.115