The rapid growth of software systems and internet-based applications has increased the risk of cyber threats such as phishing attacks, unauthorized access, and malicious software execution. Traditional security mechanisms are often insufficient to detect dynamic threats in real time. This paper presents a *Security Assessment Model for Software System*, which integrates system monitoring, phishing detection, executable file analysis, and authentication log analysis into a unified web-based platform. The proposed system continuously monitors system processes, network activity, and resource usage while allowing users to analyze website URLs and uploaded executable files for potential threats. Authentication log analysis is used to detect suspicious login activities such as repeated failed attempts or unauthorized access. The system is developed using Python Flask for backend processing, SQLite for data storage, and machine learning–based decision logic for phishing detection. Experimental evaluation demonstrates that the system effectively identifies suspicious behavior and provides timely security alerts. The proposed model can assist system administrators in enhancing software system security by proactively detecting and mitigating threats.
Authentication Log Analysis, Cyber Security, Phishing Detection, System Monitoring, Web Security.
IRE Journals:
Uzama Tabaassum, Shreesampada, Lakshmi A, Manya M, Manya S E "Security Assessment Model for Software Systems" Iconic Research And Engineering Journals Volume 9 Issue 7 2026 Page 203-205 https://doi.org/10.64388/IREV9I7-1713339
IEEE:
Uzama Tabaassum, Shreesampada, Lakshmi A, Manya M, Manya S E
"Security Assessment Model for Software Systems" Iconic Research And Engineering Journals, 9(7) https://doi.org/10.64388/IREV9I7-1713339