FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

被引:30
作者
Fang, Yong [1 ]
Liu, Yongcheng [1 ]
Huang, Cheng [1 ]
Liu, Liang [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Sichuan, Peoples R China
来源
PLOS ONE | 2020年 / 15卷 / 02期
关键词
D O I
10.1371/journal.pone.0228439
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers, considering that only a small fraction of vulnerabilities are exploited. Therefore, the realization of quick exclusion of the non-exploitable vulnerabilities and optimal patch prioritization on limited resources has become imperative for organizations. Recent works using machine learning techniques predict exploited vulnerabilities by extracting features from open-source intelligence (OSINT). However, in the face of explosive growth of vulnerability information, there is room for improvement in the application of past methods to multiple threat intelligence. A more general method is needed to deal with various threat intelligence sources. Moreover, in previous methods, traditional text processing methods were used to deal with vulnerability related descriptions, which only grasped the static statistical characteristics but ignored the context and the meaning of the words of the text. To address these challenges, we propose an exploit prediction model, which is based on a combination of fastText and LightGBM algorithm and called fastEmbed. We replicate key portions of the state-of-the-art work of exploit prediction and use them as benchmark models. Our model outperforms the baseline model whether in terms of the generalization ability or the prediction ability without temporal intermixing with an average overall improvement of 6.283% by learning the embedding of vulnerability-related text on extremely imbalanced data sets. Besides, in terms of predicting the exploits in the wild, our model also outperforms the baseline model with an F1 measure of 0.586 on the minority class (33.577% improvement over the work using features from darkweb/deepweb). The results demonstrate that the model can improve the ability to describe the exploitability of vulnerabilities and predict exploits in the wild effectively.
引用
收藏
页数:28
相关论文
共 53 条
  • [1] Comparing Vulnerability Severity and Exploits Using Case-Control Studies
    Allodi, Luca
    Massacci, Fabio
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
  • [2] Quantitative assessment of risk reduction with cybercrime black market monitoring
    Allodi, Luca
    Shim, Woohyun
    Massacci, Fabio
    [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 165 - 172
  • [3] Allodi Luca., 2012, P 2012 ACM WORKSHOP, P17
  • [4] Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
  • [5] Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums
    Almukaynizi, Mohammed
    Grimm, Alexander
    Nunes, Eric
    Shakarian, Jana
    Shakarian, Paulo
    [J]. CSS 2017: THE 2017 INTERNATIONAL CONFERENCE OF THE COMPUTATIONAL SOCIAL SCIENCE SOCIETY OF THE AMERICAS, 2017,
  • [6] Almukaynizi M, 2019, INTEL SYST REF LIBR, V151, P81, DOI 10.1007/978-3-319-98842-9_4
  • [7] [Anonymous], 2014, C EMPIRICAL METHODS
  • [8] [Anonymous], 2013, PRACT ASSESS RES EVA
  • [9] [Anonymous], 2015, SCAI, DOI DOI 10.3233/978-1-61499-589-0-48
  • [10] Bergstra J, 2012, J MACH LEARN RES, V13, P281