Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets

被引:0
|
作者
Okutan, Ahmet [1 ]
Mirakhorli, Mehdi [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022) | 2022年
关键词
Software Vulnerability; CVE; CVSS Scoring; Exploitability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Common Vulnerability and Exposure (CVE) reports published by Vulnerability Management Systems (VMSs) are used to evaluate the severity and exploitability of software vulnerabilities. Public vulnerability databases such as NVD uses the Common Vulnerability Scoring System (CVSS) to assign various scores to CVEs to evaluate their base severity, impact, and exploitability. Previous studies have shown that vulnerability databases rely on a manual, labor-intensive and error-prone process which may lead to inconsistencies in the CVE data and delays in the releasing of new CVEs. Furthermore, it was shown that CVSS scoring is based on complex calculations and may not be accurate enough in assessing the potential severity and exploitability of vulnerabilities in real life. This work uses Convolutional Neural Networks (CNN) to train text classification models to automate the prediction of the severity and exploitability of CVEs, and proposes a new exploitability scoring method by creating a Product Hygiene Index based on the Common Product Enumeration (CPE) catalog. Using CVE descriptions published by the NVD and the exploits identified by exploit databases, it trains CNN models to predict the base severity and exploitability of CVEs. Preliminary experiment results and the conducted case study indicate that the severity of CVEs can be predicted automatically with high confidences, and the proposed exploitability scoring method achieves better results compared to the exploitability scoring provided by the NVD.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 11 条
  • [1] Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
    Nakagawa, Shunta .
    Nagai, Tatsuya
    Kanehara, Hideaki
    Furumoto, Keisuke
    Takita, Makoto
    Shiraishi, Yoshiaki
    Takahashi, Takeshi
    Mohri, Masami
    Takano, Yasuhiro
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1679 - 1682
  • [2] Assessing vulnerability exploitability risk using software properties
    Awad Younis
    Yashwant K. Malaiya
    Indrajit Ray
    Software Quality Journal, 2016, 24 : 159 - 202
  • [3] Assessing vulnerability exploitability risk using software properties
    Younis, Awad
    Malaiya, Yashwant K.
    Ray, Indrajit
    SOFTWARE QUALITY JOURNAL, 2016, 24 (01) : 159 - 202
  • [4] Severity prediction of software vulnerabilities using convolutional neural networks
    Saklani, Santosh
    Kalia, Anshul
    INFORMATION AND COMPUTER SECURITY, 2025,
  • [5] Convolutional Neural Network for Software Vulnerability Detection
    Yang, Kaixi
    Miller, Paul
    Martinez-del-Rincon, Jesus
    2022 CYBER RESEARCH CONFERENCE - IRELAND (CYBER-RCI), 2022, : 83 - 86
  • [6] Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability
    Younis, Awad A.
    Malaiya, Yashwant K.
    Ray, Indrajit
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 1 - 8
  • [7] Comparing Vulnerability Severity and Exploits Using Case-Control Studies
    Allodi, Luca
    Massacci, Fabio
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
  • [8] Software Vulnerability Detection Using Deep Neural Networks: A Survey
    Lin, Guanjun
    Wen, Sheng
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    PROCEEDINGS OF THE IEEE, 2020, 108 (10) : 1825 - 1848
  • [9] Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System
    Khokhlov, Igor
    Okutan, Ahmet
    Bryla, Ryan
    Simmons, Steven
    Mirakhorli, Mehdi
    2022 IEEE 29TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC 2022), 2022, : 125 - 134
  • [10] Prioritizing Types of Vulnerability on the Basis of their Severity in Multi-version Software Systems using DEMATEL Technique
    Narang, Swati
    Kapur, P. K.
    Damodaran, D.
    Majumdar, R.
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 162 - 167