Test Case Reduction for Object Oriented Systems using Security Metrics
DOI:
https://doi.org/10.26438/ijcse/v7i6.371378Keywords:
jEdit5.5.0, Test Case, Test Cases ReductionAbstract
Test cases play crucial role in software testing. The exhaustive testing of large complex object oriented software systems has been found to be impractical due to large number of test cases execution cost. Due to this reason the researchers in the field of software testing reduce the number of test cases by selecting only effective and important test cases. This paper presents an approach for test case reduction for object oriented systems considering the security as main aspect of software system. Finding out less secure classes help software testers to remove redundant test cases at class level. Object oriented class level security metrics have been considered to detect less secure classes. To evaluate proposed approach, jEdit 5.5.0 software as a case study has been considered. Weka 3.8 was used to generate the proposed mathematical model in order to select effective metrics to detect all the less secure classes. Using feature selection techniques in Weka, effective and ineffective security metrics were categorized. Only effective metrics are taken into account for assigning weighs to each test paths. The results showed the significant improvement in results.
References
[1] M. Harrold, R. Gupta and M. Soffa, “A methodology for controlling the size of a test suite,” ACM Transactions in Software Engineering and Methodology, Vol. 2, No. 3, 1993, pp. 270-285.
[2] A. Agrawal, S. Chandra, and R.A. Khan, “An Efficient Measurement of Object-Oriented Design Vulnerability”, In Proceedings of International Conference on availability, Reliability and Security, Fukuoka, Japan, 1619 March 2008, ARES 2009
[3] Zhang Guangquan and Rong Mei, “An Approach Of Concurrent Object-Oriented Program Slicing Based On LTL Property”, International Conference on Computer Science and Software Engineering, pp. 650-653,2008
[4] S. Chandra and R. A. Khan, “Software Security Metric Identification Framework” International Conference on Advances in Computing, Communication and Control, pp. 725–731, 2009
[5] B. Alshammari, C. Fidge, and D. Corney (2009), “Security Metrics for Object-Oriented Class Designs,” 9th International Conference on Quality Software, Jeju, pp. 11-20,2009.
[6] B. Alshammari, C. Fidge, and D. Corney (2010), “Security Metrics for Object-Oriented Designs,” 21st Australian Software Engineering Conference, pp 55-64, 2010.
[7] D. M. Thakore and S. J. Sarde, “Assessing the Software Complexity and Security metrics from UML Class diagram,” International Journal of Engineering Research and Applications, vol. 2, no. 4, pp. 585–587, 2012.
[8] S. H. Gandhi, D. R. Anekar, M. A. Shaikh, and A. A. Salunkhe, “Security Metric for Object Oriented Class Design- Result Analysis,” International Journal of Innovative Technology and Exploring Engineering, vol no. 6, pp. 139–144, 2013.
[9] N. Frechette, L. Badri, and M. Badri, “Regression Test Reduction for Object-Oriented Software : A Control Call Graph Based Technique and Associated Tool,” Hindawi Publishing Corporation ISRN Software Engineering, 10 pages, vol. 2013.
[10] S. H. Gandhi, D. R. Anekar, M. A. Shaikh, and A. A. Salunkhe, “Finding Accessibility and Interaction Vulnerability of Rational Rose Class Design Using Design Metrics,” International Journal Of Scientific and Engineering Research, vol. 4, pp. 1–5, 2013.
[11] Devendra Singh Thakore and Dr. Akhilesh R Upadhyay, “A System for Identification and Assessment of Secure Design using Dynamic Security Metrics,” Journal Of Information, Knowledge and Research in Computer Engineering, vol. 2, pp. 276–278, 2013
[12] Vedpal, N. Chauhan, “Regression Test Selection for Object Oriented Systems Using OPDG and Slicing Technique,” 2nd International Conference on Computing for Sustainable Global Development, pp.1371-1378, 2015
[13] S. K. Mohapatra and S. Prasad, “Test Case Reduction Using Ant Colony Optimization for Object Oriented Program,” International Journal Of Electrical and Computer Engineering, vol. 5, no. 6, pp. 1424–1432, 2015.
[14] S. K. Mohapatra and M. Pradhan, “Finding representative test suit for test case reduction in regression testing,” International Conference on Computer, Communication and Control, Indore, 2015, pp. 1-6.
[15] S. A. Khan and R. A. Khan, “Security Improvement of Object Oriented Design using Refactoring Rules,” International Journal of Modern Education and Computer Science, vol. 2, pp. 24–31, 2015.
[16] B. M. Alshammari, “A Generic Model for Assessing Multilevel Security-Critical Object-Oriented Programs,” International Journal Of Advanced Computer Science and Applications, vol. 7, no. 11, pp. 419-427, 2016.
[17] B. Geetha and D. Jeya Mala, (2016) “Automatic Test Case Reduction in Object Oriented System Using Clustering and Fuzzy Logic,” Asian Journal of Information Technology, Vol. 15, no. 20, pp. 4071-4076.
[18] A. Al Hussein, “An Object-Oriented Software Metric Tool to Evaluate the Quality of Open Source Software,” International Journal Of Computer Science And Network Technology, vol. 17, no. 4, pp. 345–351, 2017.
[19] P. Bhandari, “Review of Object-Oriented Coupling Based Test Case Selection In Model Based Testing,” International Conference on Intelligent Computing and Control Systems, pp. 1161–1165, 2017.
[20] A. Marchetto, G. Scanniello, and A. Susi, “Combining Code and Requirements Coverage with Execution Cost for Test Suite Reduction,” IEEE Transactions on Software Engineering, vol. 5589, no. c, pp. 1–28, 2017.
[21] S. Dwivedi, “Minimization of Test Suites for Fuzzy Object-Oriented Database,” International Journal Of Computer Applications, vol.179, no. 43, pp. 10–15, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
