Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system

被引:0
作者
Shaji, Lijin [1 ]
Pramila, R. Suji [2 ]
机构
[1] Noorul Islam Ctr Higher Educ, Dept Comp Applicat, Kumaracoil 629180, Tamil Nadu, India
[2] Mar Baselios Inst Technol & Sci, Dept Comp Sci & Engn, Kothamangalam 686693, Kerala, India
关键词
Vulnerability detection; GAN; Canonical correlation analysis; DRN; Deep learning; MITIGATION; FRAMEWORK; NETWORK;
D O I
10.1007/s10878-024-01185-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Software vulnerabilities are flaws that may be exploited to cause loss or harm. Various automated machine-learning techniques have been developed in preceding studies to detect software vulnerabilities. This work tries to develop a technique for securing the software on the basis of their vulnerabilities that are already known, by developing a hybrid deep learning model to detect those vulnerabilities. Moreover, certain countermeasures are suggested based on the types of vulnerability to prevent the attack further. For different software projects taken as the dataset, feature fusion is done by utilizing canonical correlation analysis together with Deep Residual Network (DRN). A hybrid deep learning technique trained using AdamW-Rat Swarm Optimizer (AdamW-RSO) is designed to detect software vulnerability. Hybrid deep learning makes use of the Deep Belief Network (DBN) and Generative Adversarial Network (GAN). For every vulnerability, its location of occurrence within the software development procedures and techniques of alleviation via implementation level or design level activities are described. Thus, it helps in understanding the appearance of vulnerabilities, suggesting the use of various countermeasures during the initial phases of software design, and therefore, assures software security. Evaluating the performance of vulnerability detection by the proposed technique regarding recall, precision, and f-measure, it is found to be more effective than the existing methods.
引用
收藏
页数:21
相关论文
共 33 条
[1]   An Efficient Measurement of Object Oriented Design Vulnerability [J].
Agrawal, Alka ;
Chandra, Shalini ;
Khan, Raees Ahmad .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :618-623
[2]   Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network [J].
Ali, Waqas ;
Bo, Lili ;
Sun, Xiaobing ;
Wu, Xiaoxue ;
Memon, Saifullah ;
Siraj, Saima ;
Ashton, Ann Suwaree .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 232
[3]  
Antunes Nuno, 2010, 2010 IEEE International Conference on Web Services (ICWS), P203, DOI 10.1109/ICWS.2010.76
[4]   Discriminative extended canonical correlation analysis for pattern set matching [J].
Arandjelovic, Ognjen .
MACHINE LEARNING, 2014, 94 (03) :353-370
[5]   Exploitability prediction of software vulnerabilities [J].
Bhatt, Navneet ;
Anand, Adarsh ;
Yadavalli, V. S. S. .
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2021, 37 (02) :648-663
[6]   G-RAM framework for software risk assessment and mitigation strategies in organisations [J].
Biswas, Baidyanath ;
Mukhopadhyay, Arunabha .
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2018, 31 (02) :276-299
[7]   Short-Term Load Forecasting With Deep Residual Networks [J].
Chen, Kunjin ;
Chen, Kunlong ;
Wang, Qin ;
He, Ziyu ;
Hu, Jun ;
He, Jinliang .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) :3943-3952
[8]   Configuration Fuzzing for Software Vulnerability Detection [J].
Dai, Huning ;
Murphy, Christian ;
Kaiser, Gail .
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, :525-530
[9]   A novel algorithm for global optimization: Rat Swarm Optimizer [J].
Dhiman, Gaurav ;
Garg, Meenakshi ;
Nagar, Atulya ;
Kumar, Vijay ;
Dehghani, Mohammad .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (08) :8457-8482
[10]   Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations [J].
Do, Lisa Nguyen Quang ;
Wright, James R. ;
Ali, Karim .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (03) :835-847