Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System

被引:0
|
作者
Khokhlov, Igor [1 ]
Okutan, Ahmet [2 ]
Bryla, Ryan [2 ]
Simmons, Steven [2 ]
Mirakhorli, Mehdi [2 ]
机构
[1] Sacred Heart Univ, Fairfield, CT 06825 USA
[2] Rochester Inst Technol, Rochester, MN USA
关键词
Common Product Enumeration; Common Vulnerability; and Exposures; Natural Language Processing; Software Product Name Extraction; Software Vulnerability;
D O I
10.1109/STC55697.2022.00024
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities are closely monitored by the security community to timely address the security and privacy issues in software systems. Before a vulnerability is published by vulnerability management systems, it needs to be characterized to highlight its unique attributes, including affected software products and versions, to help security professionals prioritize their patches. Associating product names and versions with disclosed vulnerabilities may require a labor-intensive process that may delay their publication and fix, and thereby give attackers more time to exploit them. This work proposes a machine learning method to extract software product names and versions from unstructured CVE descriptions automatically. It uses Word2Vec and Char2Vec models to create context-aware features from CVE descriptions and uses these features to train a Named Entity Recognition (NER) model using bidirectional Long short-term memory (LSTM) networks. Based on the attributes of the product names and versions in previously published CVE descriptions, we created a set of Expert System (ES) rules to refine the predictions of the NER model and improve the performance of the developed method. Experiment results on real-life CVE examples indicate that using the trained NER model and the set of ES rules, software names and versions in unstructured CVE descriptions could be identified with FMeasure values above 0.95.
引用
收藏
页码:125 / 134
页数:10
相关论文
共 50 条
  • [1] Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports
    Mim, Rabaya Sultana
    Ahammed, Toukir
    Sakib, Kazi
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 454 - 455
  • [2] Inconsistent measurement and incorrect detection of software names in security vulnerability reports
    Sun, Hongyu
    Ou, Guoliang
    Zheng, Ziqiu
    Liao, Lei
    Wang, He
    Zhang, Yuqing
    COMPUTERS & SECURITY, 2023, 135
  • [3] Automatic event identification and extraction from daily drilling reports using an expert system and artificial intelligence
    Cinelli, Lucas P.
    de Oliveira, Jose F. L.
    de Pinho, Vinicius M.
    Passos, Wesley L.
    Padilla, Rafael
    Braz, Patrick F.
    Galves, Breno
    Dalvi, Domenica P.
    Lewenfus, Gabriela
    Ferreira, Jonathas O.
    Ji, Anthony Y. Y.
    de Oliveira, Felipe L.
    Goncalves, Clemente J. C.
    Netto, Sergio L.
    da Silva, Eduardo A. B.
    de Campos, Marcello L. R.
    JOURNAL OF PETROLEUM SCIENCE AND ENGINEERING, 2021, 205
  • [4] DOS attack using automated vulnerability scanning software
    Manolache, Florin B.
    Rusu, Octavian
    Subredu, Manuel
    Education Training and Information Communication Technologies RoEduNet' 05: Proceedings of the 4th International Conference RoEduNet Romania, 2005, : 261 - 267
  • [5] Automated Extraction of Rich Software Models from Limited System Information
    Langhammer, Michael
    Shahbazian, Arman
    Medvidovic, Nenad
    Reussner, Ralf H.
    2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 99 - 108
  • [6] Automated Software Vulnerability Testing Using Deep Learning Methods
    Kuznetsov, Alexandr
    Yeromin, Yehor
    Shapoval, Oleksiy
    Chernov, Kyrylo
    Popova, Mariia
    Serdukov, Kostyantyn
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 837 - 841
  • [7] Automated extraction system of embedded tubes from pulse radar image based on fuzzy expert system
    Nagamune, K
    Taniguchi, K
    Kobashi, S
    Hata, Y
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (07) : 1778 - 1789
  • [8] An automated information extraction system from the knowledge graph based annual financial reports
    Mohsin, Syed Farhan
    Jami, Syed Imran
    Wasi, Shaukat
    Siddiqui, Muhammad Shoaib
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [9] Automated Extraction of Security Concerns from Bug Reports
    Alqahtani, Sultan S.
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 327 - 329
  • [10] Automated extraction of Biomarker information from pathology reports
    Jeongeun Lee
    Hyun-Je Song
    Eunsil Yoon
    Seong-Bae Park
    Sung-Hye Park
    Jeong-Wook Seo
    Peom Park
    Jinwook Choi
    BMC Medical Informatics and Decision Making, 18