Mining Bug Databases for Unidentified Software Vulnerabilities

被引:0
|
作者
Wijayasekara, Dumidu [1 ]
Manic, Milos [1 ]
Wright, Jason L. [2 ]
McQueen, Miles [2 ]
机构
[1] Univ Idaho, Idaho Falls, ID 83402 USA
[2] Idaho Natl Lab Idaho Falls, Idaho Falls, ID USA
关键词
Hidden impact vulnerabilities; Bug database mining; Vulnerability discovery; Classifier; NATURAL-LANGUAGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses existing bug data mining classifiers and present an analysis of vulnerability databases showing the necessity to mine common publicly available bug databases for hidden impact vulnerabilities. We present a vulnerability analysis from January 2006 to April 2011 for two well known software packages: Linux kernel and MySQL. We show that 32% (Linux) and 62% (MySQL) of vulnerabilities discovered in this time period were hidden impact vulnerabilities. We also show that the percentage of hidden impact vulnerabilities has increased from 25% to 36% in Linux and from 59% to 65% in MySQL in the last two years. We then propose a hidden impact vulnerability identification methodology based on text mining classifier for bug databases. Finally, we discuss potential challenges faced by a development team when using such a classifier.
引用
收藏
页码:89 / 96
页数:8
相关论文
共 50 条
  • [1] Mining Software Code Repositories and Bug Databases using Survival Analysis Models
    Wedel, Michael
    Jensen, Uwe
    Goehner, Peter
    [J]. ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2008, : 282 - +
  • [2] The Research on Software Security Vulnerabilities Mining
    Liu Shuyu
    Kong Weiguang
    Yang Diwei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
  • [3] Mining trends and patterns of software vulnerabilities
    Murtaza, Syed Shariyar
    Khreich, Wael
    Hamou-Lhadj, Abdelwahab
    Bener, Ayse Basar
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 : 218 - 228
  • [5] Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities
    Bojanova, Irena
    Galhardo, Carlos Eduardo C.
    [J]. IT PROFESSIONAL, 2023, 25 (01) : 7 - 12
  • [6] Mining Social Networks for Software Vulnerabilities Monitoring
    Trabelsi, Slim
    Plate, Henrik
    Abida, Amine
    Ben Aoun, M. Marouane
    Zouaoui, Anis
    Missaoui, Chedy
    Gharbi, Sofien
    Ayari, Alaeddine
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [7] Data Mining of Software Development Databases
    Taghi M. Khoshgoftaar
    Edward B. Allen
    Wendell D. Jones
    John P. Hudepohl
    [J]. Software Quality Journal, 2001, 9 : 161 - 176
  • [8] Data mining of software development databases
    Khoshgoftaar, TM
    Allen, EB
    Jones, WD
    Hudepohl, JP
    [J]. SOFTWARE QUALITY JOURNAL, 2001, 9 (03) : 161 - 176
  • [9] Data mining in software metrics databases
    Dick, S
    Meeks, A
    Last, M
    Bunke, H
    Kandel, A
    [J]. FUZZY SETS AND SYSTEMS, 2004, 145 (01) : 81 - 110
  • [10] Vulnerability Identification and Classification Via Text Mining Bug Databases
    Wijayasekara, Dumidu
    Manic, Milos
    McQueen, Miles
    [J]. IECON 2014 - 40TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2014, : 3612 - 3618