A novel approach for software vulnerability detection based on intelligent cognitive computing

被引:0
|
作者
Cho Do Xuan
Dao Hoang Mai
Ma Cong Thanh
Bui Van Cong
机构
[1] Posts and Telecommunications Institute of Technology,Faculty of Information Security
[2] The University of Edinburgh,Department of Information Technology
[3] University of Economics and Technical Industries,undefined
来源
关键词
Source code vulnerability; Source code vulnerability detection; Code property graph; Source embedding; Data rebalancing; Feature learning; Classification;
D O I
暂无
中图分类号
学科分类号
摘要
Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advanced computational algorithms. It's a combination of four main processing techniques including (i) Source Embedding, (ii) Feature Learning, (iii) Resampling Data, and (iv) Classification. The Source Embedding method will perform the task of analyzing and standardizing the source code based on the Joern tool and the data mining algorithm. The Feature Learning model has the function of aggregating and extracting source code attribute based on node using machine learning and deep learning methods. The Resampling Data technique will perform equalization of the experimental dataset. Finally, the Classification model has the function of detecting source code vulnerabilities. The novelty and uniqueness of the new intelligent cognitive computing method is the combination and synchronous use of many different data extracting techniques to compute, represent, and extract the properties of the source code. With this new calculation method, many significant unusual properties and features of the vulnerability have been synthesized and extracted. To prove the superiority of the proposed method, we experiment to detect source code vulnerabilities based on the Verum dataset, details of this part are presented in the experimental section. The experimental results show that the method proposed in the paper has brought good results on all measures. These results have shown to be the best research results for the source code vulnerability detection task using the Verum dataset according to our survey to date. With such results, the proposal in this study is not only meaningful in terms of science but also in practical terms when the method of using intelligent cognitive computing techniques to analyze and evaluate source code has helped to improve the efficiency of the source code analysis and vulnerability detection process.
引用
收藏
页码:17042 / 17078
页数:36
相关论文
共 50 条
  • [21] Predicting software vulnerability based on software metrics: a deep learning approach
    Francis Kwadzo Agbenyegah
    Micheal Asante
    Jinfu Chen
    Ernest Akpaku
    Iran Journal of Computer Science, 2024, 7 (4) : 801 - 812
  • [22] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [23] Novel Reservoir Computing Approach for the Detection of Chaos
    Ismail, Ali Rida
    Jovanovic, Slavisa
    Petit-Watelot, Sebastien
    Rabah, Hassan
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [24] A Software Detection Mechanism Based on SMM in Network Computing
    Zhou, Lei
    Shu, Yang
    Wang, Guojun
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 134 - 143
  • [25] A Vulnerability Detection Approach Based on Comparative Learning
    Chen X.
    Liu J.
    Xia X.
    Zhou S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (09): : 2152 - 2168
  • [26] Vulnerability detection based on a dangerous function approach
    Liu, Jie
    Wang, Jiajie
    Wei, Qiang
    Wang, Qingxian
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1529 - 1533
  • [27] Ontology-based services for software vulnerability detection: a survey
    Wang, Bingquan
    Cui, Baojiang
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (04) : 333 - 339
  • [28] Cognitive computing for intelligent application and service
    Yin Zhang
    Haider Abbas
    Yujie Li
    Neural Computing and Applications, 2020, 32 : 4315 - 4316
  • [29] Binary software vulnerability detection method based on attention mechanism
    Han, Wenjie
    Pang, Jianmin
    Zhou, Xin
    Zhu, Di
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1462 - 1466
  • [30] Ontology-based services for software vulnerability detection: a survey
    Bingquan Wang
    Baojiang Cui
    Service Oriented Computing and Applications, 2019, 13 : 333 - 339