Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms

被引:0
作者
Ramesh, Vishnu [1 ]
Abraham, Sara [1 ]
Vinod, P. [2 ]
Mohamed, Isham [1 ]
Visaggio, Corrado A. [3 ]
Laudanna, Sonia [3 ]
机构
[1] SCMS Sch Engn & Technol, Dept Comp Sci & Engn, Ernakulam, Kerala, India
[2] Cochin Univ Sci & Technol, Dept Comp Applicat, Cochin, Kerala, India
[3] Univ Sannio, Dept Engn, Benevento, Italy
来源
2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2021年
关键词
Vulnerability; machine learning; deep neural networks; classification; stacking;
D O I
10.1109/IJCNN52387.2021.9534259
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the field of computer science has advanced over the years, there has been a tremendous increase in the software being created, and this increase has been accompanied by an increase in the number of software vulnerabilities. A software vulnerability is a security flaw found in software that can potentially be exploited by attackers to perform cyber attacks. Since automatic approaches for identifying and analyzing vulnerabilities have become a trending topic in research, community, the classification of vulnerability is still an open issue. Developers need to know more about characteristics and types of vulnerabilities in systems to adopt suitable countermeasures in current and next versions. With this paper, we investigate whether vulnerability descriptions alone can be used to identify the type of vulnerability, by comparing five shallow learning models and fourteen deep learning models. The model with the highest F1-score was the Stacking-DNN (98.8%). On performing comprehensive analysis, the experiments demonstrate that both shallow and deep classifiers show comparable performance when trained and tested using the dataset without duplicates, while shallow classifiers showed better performance when trained and tested using the dataset with duplicates.
引用
收藏
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2011, International Conference on Database and Expert Systems Applications
[2]  
Bozorgi M., 2010, 16 ACM SIGKDD INT C, P105, DOI DOI 10.1145/1835804.1835821
[3]  
Chollet F., 2015, Keras
[4]  
Gawron M, 2017, INT CONF INFORM COMM, P322, DOI 10.1109/IACS.2017.7921992
[5]   Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description [J].
Han, Zhuobing ;
Li, Xiaohong ;
Xing, Zhenchang ;
Liu, Hongtao ;
Feng, Zhiyong .
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, :125-136
[6]   Automatic Classification Method for Software Vulnerability Based on Deep Neural Network [J].
Huang, Guoyan ;
Li, Yazhou ;
Wang, Qian ;
Ren, Jiadong ;
Cheng, Yongqiang ;
Zhao, Xiaolin .
IEEE ACCESS, 2019, 7 :28291-28298
[7]  
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[8]  
Porter MF, 2006, PROGRAM-ELECTRON LIB, V40, P211, DOI [10.1108/00330330610681286, 10.1108/eb046814]
[9]  
Rehman S., 2012, INT J COMPUTER SCI S, V6, P238
[10]   Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities [J].
Russo, Ernesto Rosario ;
Di Sorbo, Andrea ;
Visaggio, Corrado A. ;
Canfora, Gerardo .
JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 156 :84-99