Machine learning techniques for software vulnerability prediction: a comparative study

被引:0
作者
Gul Jabeen
Sabit Rahim
Wasif Afzal
Dawar Khan
Aftab Ahmed Khan
Zahid Hussain
Tehmina Bibi
机构
[1] Tsinghua University,Department of Computer Science
[2] Karakoram International University,Shenzhen Institute of Advanced Technology
[3] Mälardalen University,Department of Information Technology
[4] Chinese Academy of Sciences,Institute of Geology
[5] The University of Haripur,undefined
[6] University of Azad Jammu and Kashmir,undefined
来源
Applied Intelligence | 2022年 / 52卷
关键词
Software vulnerability; Machine learning; Prediction models;
D O I
暂无
中图分类号
学科分类号
摘要
Software vulnerabilities represent a major cause of security problems. Various vulnerability discovery models (VDMs) attempt to model the rate at which the vulnerabilities are discovered in a software. Although several VDMs have been proposed, not all of them are universally applicable. Also most of them seldom give accurate predictive results for every type of vulnerability dataset. The use of machine learning (ML) techniques has generally found success in a wide range of predictive tasks. Thus, in this paper, we conducted an empirical study on applying some well-known machine learning (ML) techniques as well as statistical techniques to predict the software vulnerabilities on a variety of datasets. The following ML techniques have been evaluated: cascade-forward back propagation neural network, feed-forward back propagation neural network, adaptive-neuro fuzzy inference system, multi-layer perceptron, support vector machine, bagging, M5Rrule, M5P and reduced error pruning tree. The following statistical techniques have been evaluated: Alhazmi-Malaiya model, linear regression and logistic regression model. The applicability of the techniques is examined using two separate approaches: goodness-of-fit to see how well the model tracks the data, and prediction capability using different criteria. It is observed that ML techniques show remarkable improvement in predicting the software vulnerabilities than the statistical vulnerability prediction models.
引用
收藏
页码:17614 / 17635
页数:21
相关论文
共 123 条
[51]  
Semasaba AOA(undefined)undefined undefined undefined undefined-undefined
[52]  
Zheng W(undefined)undefined undefined undefined undefined-undefined
[53]  
Wu X(undefined)undefined undefined undefined undefined-undefined
[54]  
Agyemang SA(undefined)undefined undefined undefined undefined-undefined
[55]  
Zheng W(undefined)undefined undefined undefined undefined-undefined
[56]  
Gao J(undefined)undefined undefined undefined undefined-undefined
[57]  
Wu X(undefined)undefined undefined undefined undefined-undefined
[58]  
Liu F(undefined)undefined undefined undefined undefined-undefined
[59]  
Xun Y(undefined)undefined undefined undefined undefined-undefined
[60]  
Liu G(undefined)undefined undefined undefined undefined-undefined