Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism

被引:5
|
作者
Chen, Jinfu [1 ,2 ]
Wang, Weijia [1 ,2 ]
Liu, Bo [1 ,2 ]
Cai, Saihua [1 ,2 ]
Towey, Dave [3 ]
Wang, Shengran [1 ,2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Peoples R China
[3] Univ Nottingham Ningbo China, Sch Comp Sci, Ningbo 315100, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep learning; Software vulnerability detection; Temporal Convolutional Network; Self-attention Mechanism; Source-code picturization; Feature fusion;
D O I
10.1016/j.infsof.2024.107453
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Desirable characteristics in vulnerability -detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads. The widely used VDSs based on models such as Recurrent Neural Networks (RNNs) have some problems, such as low time efficiency, failing to learn the vulnerability features better, and insufficient amounts of vulnerability features. Therefore, it is very important to construct an automatic detection model with high detection accuracy. Objective: This paper reports on training based on the source code to analyze and learn from the code's patterns and structures by deep -learning techniques to generate an efficient VD model that does not require manual feature design. Method: We propose a software VD model based on multi -feature fusion and deep neural networks called AIdetectorX-SP. It first uses a Temporal Convolutional Network (TCN) and adds a Self -attention Mechanism (SaM) to the TCN to build a model for extracting vulnerability logic features, then transforms the source code into an image input to a Convolutional Neural Network (CNN) to extract structural and semantic information. Finally, we use feature -fusion technology to design and implement an improved deep -learning -based VDS, called AIdetectorX Sequence with Picturization (AIdetectorX-SP). Results: We report on experiments conducted using publicly -available and widely -used datasets to evaluate the effectiveness of AIdetectorX-SP, with results indicating that AIdetectorX-SP is an effective VDS; that the combination of TCN and SaM can effectively extract vulnerability logic features; and that the pictorial code can extract code structure features, which can further improve the VD capability. Conclusion: In this paper, we propose a novel detection model for software vulnerability based on TCNs, SaM, and software picturization. The proposed model solves some shortcomings and limitations of existing VDSs, and obtains a high software -VD accuracy with a high degree of stability.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Bearing Fault Detection Based on Convolutional Self-Attention Mechanism
    Ye, Ruida
    Wang, Weijie
    Ren, Yuan
    Zhang, Keming
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 869 - 873
  • [2] A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism
    Cai, Saihua
    Xu, Han
    Liu, Mingjie
    Chen, Zhilin
    Zhang, Guofeng
    COMPUTERS & SECURITY, 2024, 136
  • [3] Detection of malicious URLs using Temporal Convolutional Network and Multi-Head Self-Attention mechanism
    Nguyet Quang Do
    Selamat, Ali
    Krejcar, Ondrej
    Fujita, Hamido
    APPLIED SOFT COMPUTING, 2025, 169
  • [4] Network Intrusion Detection Based on Self-Attention Mechanism and BIGRU
    Du, Xuran
    Gan, Gang
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 236 - 241
  • [5] Research on Anomaly Network Detection Based on Self-Attention Mechanism
    Hu, Wanting
    Cao, Lu
    Ruan, Qunsheng
    Wu, Qingfeng
    SENSORS, 2023, 23 (11)
  • [6] A novel hybrid neural network approach incorporating convolution and LSTM with a self-attention mechanism for web attack detection
    Luo, Kangqiang
    Chen, Yindong
    APPLIED INTELLIGENCE, 2025, 55 (02)
  • [7] Vulnerability Detection Based on Deep Graph Convolutional Network and Attention Mechanism
    Xiao, Peng
    Zhang, Xusheng
    Yang, Fengyu
    Zheng, Wei
    Computer Engineering and Applications, 1600, 3 (292-305):
  • [8] Transfer learning based graph convolutional network with self-attention mechanism for abnormal electricity consumption detection
    Meng, Songping
    Li, Chengdong
    Tian, Chongyi
    Peng, Wei
    Tian, Chenlu
    ENERGY REPORTS, 2023, 9 : 5647 - 5658
  • [9] TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT
    Xu, Lijuan
    An, Baolong
    Li, Xin
    Zhao, Dawei
    Peng, Haipeng
    Song, Weizhao
    Tong, Fenghua
    Han, Xiaohui
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 30 - 44
  • [10] A Dynamic Temporal Self-attention Graph Convolutional Network for Traffic Prediction
    Jiang, Ruiyuan
    Wang, Shangbo
    Zhang, Yuli
    arXiv, 2023,