Open Source Software Vulnerability Propagation Analysis Algorithm based on Knowledge Graph

被引:5
作者
Hu, Wenhui [1 ]
Wang, Yu [2 ]
Liu, Xueyang [1 ]
Sun, Jinan [1 ]
Gao, Qing [1 ]
Huang, Yu [1 ]
机构
[1] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
[2] ChinaSoft Int Co Ltd, Beijing, Peoples R China
来源
4TH IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2019) / 3RD INTERNATIONAL SYMPOSIUM ON REINFORCEMENT LEARNING (ISRL 2019) | 2019年
关键词
open source software; vulnerability propagation analysis; knowledge graph; optimal blocking analysis; propagation difficulty; lazy strategy;
D O I
10.1109/SmartCloud.2019.00030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the extensive reuse of open source components, the scope of vulnerability impact will have cascade expansion. At the level of vulnerability data analysis, aiming at the vulnerability propagation problem, this thesis proposes a hierarchical propagation path search algorithm based on open source software vulnerability knowledge graph, at the same time, proposes a heuristic search strategy in both component layer and class layer to reduce the search space complexity, which is optimized from exponential down to polynomial. Furthermore, we propose the optimal blocking concept to represent the cost of repairing the entire propagation path, in order to measure the severity of the project's vulnerability. As for the purpose of providing effective suggestions on vulnerability repairing, we model the optimal blocking calculation as the network flow minimal separate problem, then calculate the network maximal flux to obtain the key dependencies with risks. Finally, multiple case studies with various vulnerability dependent risks show that the proposed algorithm can find software vulnerabilities affecting specific projects effectively.
引用
收藏
页码:121 / 127
页数:7
相关论文
共 10 条
  • [1] Cadariu M, 2015, EV REC SANER 2015 IE
  • [2] Han X, 2016, P P COLING 2016 26 I
  • [3] Kotnis B, 2015, P P 2015 C EMP METH
  • [4] Li Jiayin, 2002, 2010 IEEE WIC ACM IN, P253
  • [5] An automatic method for assessing the versions affected by a vulnerability
    Nguyen, Viet Hung
    Dashevskyi, Stanislav
    Massacci, Fabio
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (06) : 2268 - 2297
  • [6] Plate H, 2015, P SOFTW MAINT EV ICS
  • [7] Real-time dynamic voltage loop scheduling for multi-core embedded systems
    Shao, Zili
    Wang, Meng
    Chen, Ying
    Xue, Chun
    Qiu, Meikang
    Yang, Laurence T.
    Sha, Edwin H. -M.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (05) : 445 - 449
  • [8] Wang Q, 2015, P IJCAI
  • [9] Wang Q, 2016, P 54 ANN M ASS COMP, V1
  • [10] Zhou Z. H., 2012, Ensemble Methods: Foundations and Algorithms