Semantic Modeling Approach for Software Vulnerabilities Data Sources

被引:1
|
作者
Alqahtani, Sultan S. [1 ]
Rilling, Juergen [2 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ, Comp & Informat Sci Coll, Riyadh, Saudi Arabia
[2] Concordia Univ, Dept Comp Sci & Software Engn, Montreal, PQ, Canada
关键词
Vulnerability database; vulnerability analysis; semantic modeling; ontology; formal concept analysis; ONTOLOGY DEVELOPMENT; STABILITY;
D O I
10.1109/pst47121.2019.8949047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sources describing software security vulnerabilities are commonly used by software engineers not only increase the security of software systems but also enhance software productivity and reduce maintenance costs. However, with the constantly growing amount of available security vulnerability information and this information being spread across heterogeneous resources, software developers are struggling in taking full advantage of these resources. The Semantic Web and its supporting technology stack have been widely promoted to support the modeling, reuse and interoperability among heterogeneous data sources. In our research we present a Semantic Web enabled knowledge model which provides a formal and semi-automated approach for unifying vulnerability information resources. As part of this knowledge modeling approach, we also take advantage of Formal Concept Analysis (FCA) to identify vulnerability related knowledge concepts and model them at various abstraction levels. We illustrate the applicability and flexibility of our approach through several usage examples that take advantage of our unified knowledge model and Semantic Web inference services to provide new types of vulnerability analysis.
引用
收藏
页码:223 / 229
页数:7
相关论文
共 50 条
  • [1] Tracing known security vulnerabilities in software repositories - A Semantic Web enabled modeling approach
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    SCIENCE OF COMPUTER PROGRAMMING, 2016, 121 : 153 - 175
  • [2] An advanced approach for modeling and detecting software vulnerabilities
    Shahmehri, Nahid
    Mammar, Amel
    de Oca, Edgardo Montes
    Byers, David
    Cavalli, Ana
    Ardi, Shanai
    Jimenez, Willy
    INFORMATION AND SOFTWARE TECHNOLOGY, 2012, 54 (09) : 997 - 1013
  • [3] An approach for semantic integration of heterogeneous data sources
    Fusco, Giuseppe
    Aversano, Lerina
    PEERJ COMPUTER SCIENCE, 2020, 2020 (03) : 1 - 30
  • [4] Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2017, : 80 - 91
  • [5] Modeling software vulnerabilities with vulnerability cause graphs
    Byers, David
    Ardi, Shanai
    Shahmehri, Nahid
    Duma, Claudiu
    ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 411 - +
  • [6] An Approach for Semantic Query Mapping on the Heterogeneous Web Data Sources
    Hajmoosaei, Abdolreza
    Kareem, Sameen Abdul
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 555 - 562
  • [7] An automated approach for identifying potential vulnerabilities in software
    Ghosh, AK
    O'Connor, T
    McGraw, G
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 104 - 114
  • [8] Modeling Software Patch Management Based on Vulnerabilities Discovered
    Anand, Adarsh
    Bhatt, Navneet
    Aggrawal, Deepti
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2020, 27 (02)
  • [9] Predicting Software Vulnerabilities Using Topic Modeling with Issues
    Bulut, Fatma Gul
    Altunel, Haluk
    Tosun, Ayse
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 739 - 744
  • [10] Semantic Integration of Heterogeneous Data Sources for Monitoring Frequent-Release Software Projects
    Biffl, Stefan
    Sunindyo, Wikan Danar
    Moser, Thomas
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 360 - 367