A novel approach for software vulnerability detection based on intelligent cognitive computing

被引:0
|
作者
Cho Do Xuan
Dao Hoang Mai
Ma Cong Thanh
Bui Van Cong
机构
[1] Posts and Telecommunications Institute of Technology,Faculty of Information Security
[2] The University of Edinburgh,Department of Information Technology
[3] University of Economics and Technical Industries,undefined
来源
关键词
Source code vulnerability; Source code vulnerability detection; Code property graph; Source embedding; Data rebalancing; Feature learning; Classification;
D O I
暂无
中图分类号
学科分类号
摘要
Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advanced computational algorithms. It's a combination of four main processing techniques including (i) Source Embedding, (ii) Feature Learning, (iii) Resampling Data, and (iv) Classification. The Source Embedding method will perform the task of analyzing and standardizing the source code based on the Joern tool and the data mining algorithm. The Feature Learning model has the function of aggregating and extracting source code attribute based on node using machine learning and deep learning methods. The Resampling Data technique will perform equalization of the experimental dataset. Finally, the Classification model has the function of detecting source code vulnerabilities. The novelty and uniqueness of the new intelligent cognitive computing method is the combination and synchronous use of many different data extracting techniques to compute, represent, and extract the properties of the source code. With this new calculation method, many significant unusual properties and features of the vulnerability have been synthesized and extracted. To prove the superiority of the proposed method, we experiment to detect source code vulnerabilities based on the Verum dataset, details of this part are presented in the experimental section. The experimental results show that the method proposed in the paper has brought good results on all measures. These results have shown to be the best research results for the source code vulnerability detection task using the Verum dataset according to our survey to date. With such results, the proposal in this study is not only meaningful in terms of science but also in practical terms when the method of using intelligent cognitive computing techniques to analyze and evaluate source code has helped to improve the efficiency of the source code analysis and vulnerability detection process.
引用
收藏
页码:17042 / 17078
页数:36
相关论文
共 50 条
  • [41] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Hu, Jinchang
    Chen, Jinfu
    Zhang, Lin
    Liu, Yisong
    Bao, Qihao
    Ackah-Arthur, Hilary
    Zhang, Chi
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 604 - 613
  • [42] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Jinchang Hu
    Jinfu Chen
    Lin Zhang
    Yisong Liu
    Qihao Bao
    Hilary Ackah-Arthur
    Chi Zhang
    TsinghuaScienceandTechnology, 2020, 25 (05) : 604 - 613
  • [43] Machine Learning based Intelligent Cognitive Network using Fog Computing
    Lu, Jingyang
    Li, Lun
    Chen, Genshe
    Shen, Dan
    Pham, Khanh
    Blasch, Erik
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS X, 2017, 10196
  • [44] THE DISTRIBUTED INTELLIGENT LEARNING SYSTEM BASED ON COGNITIVE AND REACTIVE SOFTWARE AGENTS
    Zaytsev, E. I.
    DISTRIBUTED COMPUTING AND GRID-TECHNOLOGIES IN SCIENCE AND EDUCATION, 2010, : 264 - 267
  • [45] Intelligent Contract Vulnerability Detection Method Based on Bic-RL
    Zhang, Shuhui
    Hu, Changdong
    Lan, Tian
    Wang, LianHai
    Xu, Shujiang
    Shao, Wei
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 128 - 135
  • [46] An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology
    Yi, Mao
    Xu, Xiaohui
    Xu, Lei
    IEEE ACCESS, 2019, 7 : 164803 - 164814
  • [47] A Novel Intelligent Computing based Localization Algorithm for Internet of Things
    Zhang, Yaming
    Gan, Jianhou
    Liu, Yan
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 651 - 654
  • [48] Design of Intelligent Software Security System Based on Spark Big Data Computing
    Xu, Chong
    Li, Jing
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [49] Development of open nutritional recipe software for obese children based on intelligent computing
    Zhang L.-F.
    Zhou L.
    International Journal of Applied Decision Sciences, 2023, 16 (05) : 646 - 661
  • [50] An Approach to Oral English Assessment Based on Intelligent Computing Model
    Jing, Caihong
    Zhao, Xiaoling
    Ren, Haiyan
    Chen, Xuexia
    Gaowa, Naren
    SCIENTIFIC PROGRAMMING, 2022, 2022