Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism

被引:5
作者
Chen, Jinfu [1 ,2 ]
Wang, Weijia [1 ,2 ]
Liu, Bo [1 ,2 ]
Cai, Saihua [1 ,2 ]
Towey, Dave [3 ]
Wang, Shengran [1 ,2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Peoples R China
[3] Univ Nottingham Ningbo China, Sch Comp Sci, Ningbo 315100, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep learning; Software vulnerability detection; Temporal Convolutional Network; Self-attention Mechanism; Source-code picturization; Feature fusion;
D O I
10.1016/j.infsof.2024.107453
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Desirable characteristics in vulnerability -detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads. The widely used VDSs based on models such as Recurrent Neural Networks (RNNs) have some problems, such as low time efficiency, failing to learn the vulnerability features better, and insufficient amounts of vulnerability features. Therefore, it is very important to construct an automatic detection model with high detection accuracy. Objective: This paper reports on training based on the source code to analyze and learn from the code's patterns and structures by deep -learning techniques to generate an efficient VD model that does not require manual feature design. Method: We propose a software VD model based on multi -feature fusion and deep neural networks called AIdetectorX-SP. It first uses a Temporal Convolutional Network (TCN) and adds a Self -attention Mechanism (SaM) to the TCN to build a model for extracting vulnerability logic features, then transforms the source code into an image input to a Convolutional Neural Network (CNN) to extract structural and semantic information. Finally, we use feature -fusion technology to design and implement an improved deep -learning -based VDS, called AIdetectorX Sequence with Picturization (AIdetectorX-SP). Results: We report on experiments conducted using publicly -available and widely -used datasets to evaluate the effectiveness of AIdetectorX-SP, with results indicating that AIdetectorX-SP is an effective VDS; that the combination of TCN and SaM can effectively extract vulnerability logic features; and that the pictorial code can extract code structure features, which can further improve the VD capability. Conclusion: In this paper, we propose a novel detection model for software vulnerability based on TCNs, SaM, and software picturization. The proposed model solves some shortcomings and limitations of existing VDSs, and obtains a high software -VD accuracy with a high degree of stability.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Multiple instance learning method based on convolutional neural network and self-attention for early cancer detection
    Liu, Junjiang
    Zhou, Shusen
    Zang, Mujun
    Liu, Chanjuan
    Liu, Tong
    Wang, Qingjun
    COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING, 2024,
  • [22] Bearing fault diagnosis network based on adaptive dimension-increasing and convolutional self-attention
    Guan, Le
    Wang, Xinyang
    Yang, Duo
    Zhang, Tianqi
    Zhu, Li
    Chen, Jianguo
    Wang, Zhen
    Zhendong yu Chongji/Journal of Vibration and Shock, 2024, 43 (17): : 289 - 299
  • [23] D3-SACNN: DGA Domain Detection With Self-Attention Convolutional Network
    Zhao, Kejun
    Guo, Wei
    Qin, Fenglin
    Wang, Xinjun
    IEEE ACCESS, 2022, 10 : 69250 - 69263
  • [24] Wireless Link Quality Prediction Based on Temporal Convolutional Networks and Self-Attention Fusion
    Wang, Yao
    Liu, Linlan
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKS AND INTERNET OF THINGS, CNIOT 2024, 2024, : 448 - 453
  • [25] Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image
    Limin Shen
    Jiayin Feng
    Zhen Chen
    Zhongkui Sun
    Dongkui Liang
    Hui Li
    Yuying Wang
    Applied Intelligence, 2023, 53 : 683 - 705
  • [26] Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image
    Shen, Limin
    Feng, Jiayin
    Chen, Zhen
    Sun, Zhongkui
    Liang, Dongkui
    Li, Hui
    Wang, Yuying
    APPLIED INTELLIGENCE, 2023, 53 (01) : 683 - 705
  • [27] Self-Attention Spatio-Temporal Deep Collaborative Network for Robust FDIA Detection in Smart Grids
    Zu, Tong
    Li, Fengyong
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (02): : 1395 - 1417
  • [28] Method for Remaining Useful Life Prediction of Turbofan Engines Combining Adam Optimization-Based Self-Attention Mechanism with Temporal Convolutional Networks
    Wang, Hairui
    Li, Dongjun
    Li, Ya
    Zhu, Guifu
    Lin, Rongxiang
    APPLIED SCIENCES-BASEL, 2024, 14 (17):
  • [29] Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism
    Zhao, Ping
    Fan, Zhijie
    Cao, Zhiwei
    Li, Xin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01) : 1 - 20
  • [30] Aspect-Level Sentiment Analysis Based on Self-Attention and Graph Convolutional Network
    Chen K.
    Huang C.
    Lin H.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2024, 47 (01): : 127 - 132