Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism

被引:5
作者
Chen, Jinfu [1 ,2 ]
Wang, Weijia [1 ,2 ]
Liu, Bo [1 ,2 ]
Cai, Saihua [1 ,2 ]
Towey, Dave [3 ]
Wang, Shengran [1 ,2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Peoples R China
[3] Univ Nottingham Ningbo China, Sch Comp Sci, Ningbo 315100, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep learning; Software vulnerability detection; Temporal Convolutional Network; Self-attention Mechanism; Source-code picturization; Feature fusion;
D O I
10.1016/j.infsof.2024.107453
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Desirable characteristics in vulnerability -detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads. The widely used VDSs based on models such as Recurrent Neural Networks (RNNs) have some problems, such as low time efficiency, failing to learn the vulnerability features better, and insufficient amounts of vulnerability features. Therefore, it is very important to construct an automatic detection model with high detection accuracy. Objective: This paper reports on training based on the source code to analyze and learn from the code's patterns and structures by deep -learning techniques to generate an efficient VD model that does not require manual feature design. Method: We propose a software VD model based on multi -feature fusion and deep neural networks called AIdetectorX-SP. It first uses a Temporal Convolutional Network (TCN) and adds a Self -attention Mechanism (SaM) to the TCN to build a model for extracting vulnerability logic features, then transforms the source code into an image input to a Convolutional Neural Network (CNN) to extract structural and semantic information. Finally, we use feature -fusion technology to design and implement an improved deep -learning -based VDS, called AIdetectorX Sequence with Picturization (AIdetectorX-SP). Results: We report on experiments conducted using publicly -available and widely -used datasets to evaluate the effectiveness of AIdetectorX-SP, with results indicating that AIdetectorX-SP is an effective VDS; that the combination of TCN and SaM can effectively extract vulnerability logic features; and that the pictorial code can extract code structure features, which can further improve the VD capability. Conclusion: In this paper, we propose a novel detection model for software vulnerability based on TCNs, SaM, and software picturization. The proposed model solves some shortcomings and limitations of existing VDSs, and obtains a high software -VD accuracy with a high degree of stability.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Detection of malicious URLs using Temporal Convolutional Network and Multi-Head Self-Attention mechanism
    Nguyet Quang Do
    Selamat, Ali
    Krejcar, Ondrej
    Fujita, Hamido
    APPLIED SOFT COMPUTING, 2025, 169
  • [2] A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism
    Cai, Saihua
    Xu, Han
    Liu, Mingjie
    Chen, Zhilin
    Zhang, Guofeng
    COMPUTERS & SECURITY, 2024, 136
  • [3] A novel hybrid neural network approach incorporating convolution and LSTM with a self-attention mechanism for web attack detection
    Luo, Kangqiang
    Chen, Yindong
    APPLIED INTELLIGENCE, 2025, 55 (02)
  • [4] Network Intrusion Detection Based on Self-Attention Mechanism and BIGRU
    Du, Xuran
    Gan, Gang
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 236 - 241
  • [5] Transfer learning based graph convolutional network with self-attention mechanism for abnormal electricity consumption detection
    Meng, Songping
    Li, Chengdong
    Tian, Chongyi
    Peng, Wei
    Tian, Chenlu
    ENERGY REPORTS, 2023, 9 : 5647 - 5658
  • [6] SCVD-SA: A Smart Contract Vulnerability Detection Method based on Hybrid Deep Learning Model and Self-attention Mechanism
    Wang, Dongjie
    Chen, Jinfu
    Cai, Saihua
    Feng, Qiaowei
    Chen, Yuhao
    Hu, Xinyi
    2024 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING-COMPANION, SANER-C 2024, 2024, : 207 - 214
  • [7] TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT
    Xu, Lijuan
    An, Baolong
    Li, Xin
    Zhao, Dawei
    Peng, Haipeng
    Song, Weizhao
    Tong, Fenghua
    Han, Xiaohui
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 30 - 44
  • [8] A feature detection network based on self-attention mechanism for underwater image processing
    Wu, Di
    Su, Boxun
    Hao, Lichao
    Wang, Ye
    Zhang, Liukun
    Yan, Zheping
    OCEAN ENGINEERING, 2024, 311
  • [9] A novel temporal convolutional network with residual self-attention mechanism for remaining useful life prediction of rolling bearings
    Cao, Yudong
    Ding, Yifei
    Jia, Minping
    Tian, Rushuai
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 215
  • [10] Remaining Useful Life Prediction of Bearings Based on Multi-head Self-attention Mechanism, Multi-scale Temporal Convolutional Network and Convolutional Neural Network
    Wei, Hao
    Gu, Yu
    Zhang, Qinghua
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 3027 - 3032