Software vulnerability prioritization using vulnerability description

被引:0
|
作者
Sharma, Ruchi [1 ]
Sibal, Ritu [1 ]
Sabharwal, Sangeeta [1 ]
机构
[1] Netaji Subhas Univ Technol, Dept Comp Engn, Delhi, India
关键词
Prioritization; Convolutional neural network; Vulnerability description; Severity; VRSS;
D O I
10.1007/s13198-020-01021-7
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Whenever a vulnerability is detected by the testing team, it is described based on its characteristics and a detailed overview of the vulnerability is given by the testing team. Usually, there are certain features or keywords that points towards the possible severity level of a vulnerability. Using these keywords in the vulnerability description, a possible estimation of the severity level of vulnerabilities can be given just by their description. In this paper, we are eliminating the need for generating a severity score for software vulnerabilities by using the description of a vulnerability for their prioritization. This study makes use of word embedding and convolution neural network (CNN). The CNN is trained with sufficient samples vulnerability descriptions from all the categories, so that it can capture discriminative words and features for the categorization task. The proposed system helps to channelize the efforts of the testing team by prioritizing the newly found vulnerabilities in three categories based on previous data. The dataset includes three data samples from three different vendors and two mixed vendor data samples.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [21] Vulnerability Testing of Software Using Extended EAI Model
    Zeng, Fanping
    Li, Ling
    Li, Juan
    Wang, Xufa
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 261 - 265
  • [22] Software Vulnerability Detection using Large Language Models
    Das Purba, Moumita
    Ghosh, Arpita
    Radford, Benjamin J.
    Chu, Bill
    [J]. 2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS, ISSREW, 2023, : 112 - 119
  • [23] Patching Power System Software Vulnerability Using CNNVD
    Wu, Qin-qin
    Wei, Li-hao
    Liang, Zhi-qiang
    Yu, Zhi-wen
    Chen, Min
    Chen, Zhi-hua
    Tan, Jin-jun
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND MECHATRONICS ENGINEERING (CCME 2018), 2018, 332 : 356 - 360
  • [24] DOS attack using automated vulnerability scanning software
    Manolache, Florin B.
    Rusu, Octavian
    Subredu, Manuel
    [J]. Education Training and Information Communication Technologies RoEduNet' 05: Proceedings of the 4th International Conference RoEduNet Romania, 2005, : 261 - 267
  • [25] TALC: Using Desktop Graffiti to Fight Software Vulnerability
    Sankarapandian, Kandha
    Little, Travis
    Edwards, W. Keith
    [J]. CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2008, : 1055 - 1064
  • [26] Using Software Structure to Predict Vulnerability Exploitation Potential
    Younis, Awad A.
    Malaiya, Yashwant K.
    [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 13 - 18
  • [27] Assessing vulnerability exploitability risk using software properties
    Younis, Awad
    Malaiya, Yashwant K.
    Ray, Indrajit
    [J]. SOFTWARE QUALITY JOURNAL, 2016, 24 (01) : 159 - 202
  • [28] Economics of software vulnerability disclosure
    Arora, A
    Telang, R
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (01) : 20 - 25
  • [29] Prediction of Future Vulnerability Discovery in Software Applications using Vulnerability Syntax Tree (PFVD-VST)
    Periyasamy, Kola
    Arirangan, Saranya
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 288 - 294
  • [30] Improving VRSS-based vulnerability prioritization using analytic hierarchy process
    Liu, Qixu
    Zhang, Yuqing
    Kong, Ying
    Wu, Qianru
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1699 - 1708