Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach

被引:1
|
作者
Figueiredo, Caina [1 ]
Lopes, Joao Gabriel [1 ]
Azevedo, Rodrigo [1 ]
Zaverucha, Gerson [1 ]
Menasche, Daniel Sadoc [1 ]
de Aguiar, Leandro Pfleger [2 ]
机构
[1] Univ Fed Rio de Janeiro, Rio De Janeiro, RJ, Brazil
[2] Siemens Technol, Princeton, NJ USA
关键词
Statistical relational learning; security; exploits;
D O I
10.1109/CSR51186.2021.9527984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data on software vulnerabilities, products and exploits is typically collected from multiple non-structured sources. Valuable information, e.g., on which products are affected by which exploits, is conveyed by matching data from those sources, i.e., through their relations. In this paper, we leverage this simple albeit unexplored observation to introduce a statistical relational learning (SRL) approach for the analysis of vulnerabilities, products and exploits. In particular, we focus on the problem of determining the existence of an exploit for a given product, given information about the relations between products and vulnerabilities, and vulnerabilities and exploits, focusing on Industrial Control Systems (ICS), the National Vulnerability Database and ExploitDB. Using RDN-Boost, we were able to reach an AUC ROC of 0.83 and an AUC PR of 0.69 for the problem at hand. To reach that performance, we indicate that it is instrumental to include textual features, e.g., extracted from the description of vulnerabilities, as well as structured information, e.g., about product categories. In addition, using interpretable relational regression trees we report simple rules that shed insight on factors impacting the weaponization of ICS products.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [1] A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits
    Pereira, Caina Figueiredo
    Lopes de Oliveira, Joao Gabriel
    Santos, Rodrigo Azevedo
    Vieira, Daniel
    Miranda, Lucas
    Zaverucha, Gerson
    de Aguiar, Leandro Pfleger
    Menasche, Daniel Sadoc
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3782 - 3802
  • [2] Ethics of the software vulnerabilities and exploits market
    Wolf, Marty J.
    Fresco, Nir
    INFORMATION SOCIETY, 2016, 32 (04): : 269 - 279
  • [3] A Quantitative Approach for the Likelihood of Exploits of System Vulnerabilities
    Verma, Siddhartha
    Gruber, Thomas
    Puschner, Peter
    Schmittner, Christoph
    Schoitsch, Erwin
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 177 - 189
  • [4] Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models
    Kalouptsoglou, Ilias
    Tsoukalas, Dimitrios
    Siavvas, Miltiadis
    Kehagias, Dionysios
    Chatzigeorgiou, Alexander
    Ampatzoglou, Apostolos
    ELECTRONICS, 2022, 11 (18)
  • [5] An inductive logic programming approach to statistical relational learning
    Kersting, Kristian
    AI COMMUNICATIONS, 2006, 19 (04) : 389 - 390
  • [6] A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
    Holm, Hannes
    Korman, Matus
    Ekstedt, Mathias
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 : 304 - 318
  • [7] A Machine Learning Approach for Statistical Software Testing
    Baskiotis, Nicolas
    Sebag, Michele
    Gaudel, Marie-Claude
    Gouraud, Sandrine
    20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2007, : 2274 - 2279
  • [8] Relational learning: Statistical approach versus logical approach in document image understanding
    Ceci, M
    Berardi, M
    Malerba, D
    AI*IA2005: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2005, 3673 : 418 - 429
  • [9] Statistical relational learning of trust
    Achim Rettinger
    Matthias Nickles
    Volker Tresp
    Machine Learning, 2011, 82 : 191 - 209
  • [10] A Survey on Statistical Relational Learning
    Khosravi, Hassan
    Bina, Bahareh
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2010, 6085 : 256 - 268