Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey

被引:221
|
作者
Ghaffarian, Seyed Mohammad [1 ]
Shahriari, Hamid Reza [1 ]
机构
[1] Amirkabir Univ Technol, Comp Engn & Informat Technol Dept, 424 Hafez Ave, Tehran, Iran
关键词
Software vulnerability analysis; software vulnerability discovery; software security; machine-learning; data-mining; review; survey; STATIC ANALYSIS; FAULT; COMPLEXITY; SYSTEMS; METRICS;
D O I
10.1145/3092566
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high severity impacts, many different approaches have been proposed in the past decades to mitigate the damages of software vulnerabilities. Machine-learning and data-mining techniques are also among the many approaches to address this issue. In this article, we provide an extensive review of the many different works in the field of software vulnerability analysis and discovery that utilize machine-learning and data-mining techniques. We review different categories of works in this domain, discuss both advantages and shortcomings, and point out challenges and some uncharted territories in the field.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
    Zeng, Peng
    Lin, Guanjun
    Pan, Lei
    Tai, Yonghang
    Zhang, Jun
    IEEE ACCESS, 2020, 8 : 197158 - 197172
  • [2] Accelerated Discovery of the Polymer Blends for Cartilage Repair through Data-Mining Tools and Machine-Learning Algorithm
    Mairpady, Anusha
    Mourad, Abdel-Hamid, I
    Mozumder, Mohammad Sayem
    POLYMERS, 2022, 14 (09)
  • [3] Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning
    Prabakaran, S.
    Mitra, Shilpa
    PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [4] Survey of Software Vulnerability Mining Methods Based on Machine Learning
    Li Y.
    Huang C.-L.
    Wang Z.-F.
    Yuan L.
    Wang X.-C.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (07): : 2040 - 2061
  • [5] Software Vulnerability Discovery Techniques: A Survey
    Liu, Bingchang
    Shi, Liang
    Cai, Zhuhua
    Li, Min
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156
  • [6] Machine Learning Techniques for Data Mining: A Survey
    Sharma, Seema
    Agrawal, Jitendra
    Agarwal, Shikha
    Sharma, Sanjeev
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 162 - 167
  • [7] Agriculture Analysis Using Data Mining And Machine Learning Techniques
    Vanitha, C. N.
    Archana, N.
    Sowmiya, R.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 984 - 990
  • [8] Advanced machine-learning techniques in drug discovery
    Elbadawi, Moe
    Gaisford, Simon
    Basit, Abdul W.
    DRUG DISCOVERY TODAY, 2020, 26 (03) : 769 - 777
  • [9] Survey on Software Vulnerability Analysis method based on Machine Learning
    Gong Jie
    Kuang Xiao-hui
    Liu Qiang
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 642 - 647
  • [10] Survey on Vulnerability Mining Techniques of Network Protocol Software
    Yu B.
    Su J.-S.
    Yang Q.
    Huang J.-X.
    Sheng Z.-S.
    Liu R.-H.
    Lu J.-J.
    Liang C.
    Chen C.
    Zhao L.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (02): : 872 - 898