Graph-based explainable vulnerability prediction

被引:0
|
作者
Nguyen, Hong Quy [1 ]
Hoang, Thong [2 ]
Dam, Hoa Khanh [1 ]
Ghose, Aditya [1 ]
机构
[1] Univ Wollongong, 2 Northfields Ave, Keiraville, NSW 2500, Australia
[2] CSIRO Data61, Level 5-13 Garden St, Eveleigh, NSW 2015, Australia
关键词
Graph neural network; Explanation; Vulnerability; NETWORKS; LANGUAGE;
D O I
10.1016/j.infsof.2024.107566
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Significant increases in cyberattacks worldwide have threatened the security of organizations, businesses, and individuals. Cyberattacks exploit vulnerabilities in software systems. Recent work has leveraged powerful and complex models, such as deep neural networks, to improve the predictive performance of vulnerability detection models. However, these models are often regarded as "black box"models, making it challenging for software practitioners to understand and interpret their predictions. This lack of explainability has resulted in a reluctance to adopt or deploy these vulnerability prediction models in industry applications. This paper proposes a novel approach, G enetic A lgorithm-based Vul nerability Prediction Explainer, , (herein GAVulExplainer), which generates explanations for vulnerability prediction models based on graph neural networks. GAVulExplainer leverages genetic algorithms to construct a subgraph explanation that represents the crucial factor contributing to the vulnerability. Experimental results show that our proposed approach outperforms baselines in providing concrete reasons for a vulnerability prediction.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] BLOOD GLUCOSE LEVEL PREDICTION: AN EXPLAINABLE GRAPH-BASED METHOD
    Piao, C.
    Zhu, T.
    Wang, J.
    Taylor, P.
    Baldeweg, S. E.
    Naik, S.
    Li, K.
    DIABETES TECHNOLOGY & THERAPEUTICS, 2023, 25 : A100 - A101
  • [2] Explainable Image Recognition With Graph-Based Feature Extraction
    Azam, Basim
    Kuttichira, Deepthi P.
    Verma, Brijesh
    Rahman, Ashfaqur
    Wang, Lipo
    IEEE ACCESS, 2024, 12 : 150325 - 150333
  • [3] Vulnerability Metrics for Graph-based Configuration Security
    Igartibo, Ibifubara
    Albanese, Massimiliano
    Mosko, Marc
    Bier, Eric
    Brito, Alejandro E.
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 259 - 270
  • [4] Graph-based neural networks for explainable image privacy inference
    Yang, Guang
    Cao, Juan
    Chen, Zhineng
    Guo, Junbo
    Li, Jintao
    PATTERN RECOGNITION, 2020, 105
  • [5] Holistic Graph-based Motion Prediction
    Grimm, Daniel
    Schoerner, Philip
    Dressler, Moritz
    Zoellner, J-Marius
    2023 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, ICRA, 2023, : 2965 - 2972
  • [6] Graph-Based Prediction of Meeting Participation
    Murray, Gabriel
    MULTIMODAL TECHNOLOGIES AND INTERACTION, 2019, 3 (03)
  • [7] VulChecker: Graph-based Vulnerability Localization in Source Code
    Mirsky, Yisroel
    Macon, George
    Brown, Michael
    Yagemann, Carter
    Pruett, Matthew
    Downing, Evan
    Mertoguno, Sukarno
    Lee, Andwenke
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6557 - 6574
  • [8] A graph-based system for network-vulnerability analysis
    Phillips, C
    Swiler, LP
    NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 71 - 79
  • [9] A Rapid Review on Graph-Based Learning Vulnerability Detection
    Foulefack, Rosmael Zidane Lekeufack
    Marchetto, Alessandro
    QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2024, 2024, 2178 : 355 - 372
  • [10] Vulnerability Analysis through a Graph-based Protection System
    Rafiei, Mohammad Ebrahim
    Jalili, Rasool
    Mousavi, Hamid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (12): : 311 - 319