Automatic software vulnerability assessment by extracting vulnerability elements

被引:7
|
作者
Sun, Xiaobing [1 ,2 ]
Ye, Zhenlei [1 ]
Bo, Lili [1 ,2 ,3 ]
Wu, Xiaoxue [1 ,2 ]
Wei, Ying [1 ]
Zhang, Tao [4 ]
Li, Bin [1 ,2 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou, Peoples R China
[2] Yangzhou Univ, Jiangsu Prov Engn Res Ctr Knowledge Management & I, Yangzhou, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Key Lab Safety Crit Software, Minist Ind & Informat Technol, Nanjing, Peoples R China
[4] Macau Univ Sci & Technol MUST, Sch Comp Sci & Engn, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability assessment; Deep learning; Multi-class classification; Mining software repositories; CLASSIFICATION;
D O I
10.1016/j.jss.2023.111790
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities take threats to software security. When faced with multiple software vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess the severity of vulnerabilities in advance. However, increasing number of vulnerability descriptions do not use templates, which reduces the performance of the existing software vulnerability assessment approaches. In this paper, we propose an automated vulnerability assessment approach that using vulnerability elements for predicting the severity of six vulnerability metrics (i.e., Access Vector, Access Complexity, Authentication, Confidentiality Impact, Integrity Impact and Availability Impact). First, we use BERT-MRC to extract vulnerability elements from vulnerability descriptions. Second, we assess six metrics using vulnerability elements instead of full descriptions. We conducted experiments on our manually labeled dataset. The experimental results show that our approach has an improvement of 12.03%, 14.37%, and 38.65% on Accuracy over three baselines.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A CNN-based automatic vulnerability detection
    An, Jung Hyun
    Wang, Zhan
    Joe, Inwhee
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [22] Automatic segmentation of large power systems into fuzzy coherent areas for dynamic vulnerability assessment
    Kamwa, Innocent
    Pradhan, Ashok Kumar
    Joos, Geza
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) : 1974 - 1985
  • [23] Modelling the elements of country vulnerability to earthquake disasters
    Asef, M. R.
    DISASTERS, 2008, 32 (03) : 480 - 498
  • [24] Commit-Level, Neural Vulnerability Detection and Assessment
    Li, Yi
    Yadavally, Aashish
    Zhang, Jiaxing
    Wang, Shaohua
    Nguyen, Tien N.
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1024 - 1036
  • [25] Climate change vulnerability assessment of species
    Foden, Wendy B.
    Young, Bruce E.
    Akcakaya, H. Resit
    Garcia, Raquel A.
    Hoffmann, Ary A.
    Stein, Bruce A.
    Thomas, Chris D.
    Wheatley, Christopher J.
    Bickford, David
    Carr, Jamie A.
    Hole, David G.
    Martin, Tara G.
    Pacifici, Michela
    Pearce-Higgins, James W.
    Platts, Philip J.
    Visconti, Piero
    Watson, James E. M.
    Huntley, Brian
    WILEY INTERDISCIPLINARY REVIEWS-CLIMATE CHANGE, 2019, 10 (01)
  • [26] System for network vulnerability assessment and defense
    Kotapati, K
    Venkataraman, V
    Liu, H
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCI I, 2002, : 235 - 240
  • [27] Australian approaches to coastal vulnerability assessment
    Harvey, Nick
    Woodroffe, Colin D.
    SUSTAINABILITY SCIENCE, 2008, 3 (01) : 67 - 87
  • [28] Airport vulnerability assessment - an analytical approach
    Lazarick, RT
    ENFORCEMENT AND SECURITY TECHNOLOGIES, 1998, 3575 : 302 - 310
  • [29] Assessment of the cybersecurity vulnerability of construction networks
    Mantha, Bharadwaj R. K.
    Garcia de Soto, Borja
    ENGINEERING CONSTRUCTION AND ARCHITECTURAL MANAGEMENT, 2021, 28 (10) : 3078 - 3105
  • [30] The Vulnerability Assessment for Emergency Response Plans
    Ariani, Arni
    Lewis, John
    Ray, Pradeep K.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2016, : 7 - 10