DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities

被引:1
作者
Wu, Susheng [1 ]
Chen, Bin [1 ]
Sun, MingXu [1 ]
Duan, Renyu [1 ]
Zhang, Qixiang [2 ]
Huang, Cheng [1 ,3 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
[2] Sichuan Univ, Coll Software, Chengdu, Peoples R China
[3] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Vulnerability intelligence; Open source community; Data mining; Vulnerability detection; Machine learning; Neural networks;
D O I
10.1109/TrustCom53373.2021.00090
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Open-source code repositories play an important role in software development, but they also introduce a slew of security issues. Firstly, everyone can use open-source projects and libraries from the third-party ecosystem, which increases the risk of vulnerabilities attacking. Secondly, it may cause a domino effect and make these products inherit these vulnerabilities when referring to vulnerable repositories. Traditional technical methods were unable to detect these public flaws in a timely manner, leaving these developers in an insecure situation. Although vulnerability management institutes like CVE and NVD provide inadequate coverage, leading to a lack of timely, reliable, and detailed information about open-source projects' vulnerabilities. To better detect and repair vulnerability, we designed a vulnerability intelligence mining system named DeepVuler based on threads analysis and changed code in open-source communities using machine learning. We choose and define a series of effective features extracted from open-source communities to early infer vulnerability intelligence. Our result shows that two proposed models of DeepVuler achieve a detection rate of 0.979 in threads and 0.890 in changed codes. Besides, the detection from DeepVuler is often days or weeks ahead of official vulnerability disclosure.
引用
收藏
页码:598 / 605
页数:8
相关论文
共 41 条
[1]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[2]  
[Anonymous], 2020, 2020 OPEN SOURCE SEC
[3]  
[Anonymous], Checkmarx
[4]  
[Anonymous], FLAWFINDER
[5]  
[Anonymous], 2017, MOST VULNERABILITIES
[6]  
[Anonymous], 2021, IEEE Trans. Broadcast.
[7]  
[Anonymous], Rough audit tool for security
[8]   A comparison of the efficiency and effectiveness of vulnerability discovery techniques [J].
Austin, Andrew ;
Holmgreen, Casper ;
Williams, Laurie .
INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (07) :1279-1288
[9]  
Breiman L., 1984, CLASSIFICATION REGRE, V1st ed., DOI [10.1201/9781315139470, DOI 10.1201/9781315139470]
[10]   A Hybrid Approach for Detecting Automated Spammers in Twitter [J].
Fazil, Mohd ;
Abulaish, Muhammad .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2707-2719