Automatic software vulnerability assessment by extracting vulnerability elements

被引:6
|
作者
Sun, Xiaobing [1 ,2 ]
Ye, Zhenlei [1 ]
Bo, Lili [1 ,2 ,3 ]
Wu, Xiaoxue [1 ,2 ]
Wei, Ying [1 ]
Zhang, Tao [4 ]
Li, Bin [1 ,2 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou, Peoples R China
[2] Yangzhou Univ, Jiangsu Prov Engn Res Ctr Knowledge Management & I, Yangzhou, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Key Lab Safety Crit Software, Minist Ind & Informat Technol, Nanjing, Peoples R China
[4] Macau Univ Sci & Technol MUST, Sch Comp Sci & Engn, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability assessment; Deep learning; Multi-class classification; Mining software repositories; CLASSIFICATION;
D O I
10.1016/j.jss.2023.111790
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities take threats to software security. When faced with multiple software vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess the severity of vulnerabilities in advance. However, increasing number of vulnerability descriptions do not use templates, which reduces the performance of the existing software vulnerability assessment approaches. In this paper, we propose an automated vulnerability assessment approach that using vulnerability elements for predicting the severity of six vulnerability metrics (i.e., Access Vector, Access Complexity, Authentication, Confidentiality Impact, Integrity Impact and Availability Impact). First, we use BERT-MRC to extract vulnerability elements from vulnerability descriptions. Second, we assess six metrics using vulnerability elements instead of full descriptions. We conducted experiments on our manually labeled dataset. The experimental results show that our approach has an improvement of 12.03%, 14.37%, and 38.65% on Accuracy over three baselines.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] CloudER: A Framework for Automatic Software Vulnerability Location and Patching in the Cloud
    Chen, Ping
    Xu, Dongyan
    Mao, Bing
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [22] AVIA: Automatic Vulnerability Impact Assessment on the Target System
    Tatarinova, Yuliia
    2018 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), 2018, : 364 - 368
  • [23] Software Vulnerability Assessment: Vendor, Scanner, and User Analysis
    Boonchuay, Kietthibhum
    Siripaktanakon, Wachirawich
    Sangpetch, Orathai
    Sangpetch, Akkarit
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 214 - 221
  • [24] Vulnerability distribution scoring for software product security assessment
    Rasheed, Hassan, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [25] Design and development of aircraft vulnerability assessment software system
    Pei, Yang
    Song, Bi-Feng
    Han, Qing
    Binggong Xuebao/Acta Armamentarii, 2007, 28 (06): : 714 - 719
  • [26] Security Risk Growth Models for Software Vulnerability Assessment
    Minohara, Takashi
    Shimakawa, Masaya
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 32 - 35
  • [27] Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
    Rahimi, Sanaz
    Zargham, Mehdi
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (02) : 395 - 407
  • [28] Coastal Management: A Review of Key Elements for Vulnerability Assessment
    Cruz-Ramirez, Cesia J.
    Chavez, Valeria
    Silva, Rodolfo
    Munoz-Perez, Juan J.
    Rivera-Arriaga, Evelia
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2024, 12 (03)
  • [29] A Software Vulnerability Rating Approach Based on the Vulnerability Database
    Luo, Jian
    Lo, Kueiming
    Qu, Haoran
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [30] Automatic Classification Method for Software Vulnerability Based on Deep Neural Network
    Huang, Guoyan
    Li, Yazhou
    Wang, Qian
    Ren, Jiadong
    Cheng, Yongqiang
    Zhao, Xiaolin
    IEEE ACCESS, 2019, 7 : 28291 - 28298