Software vulnerability prioritization using vulnerability description

被引:0
|
作者
Sharma, Ruchi [1 ]
Sibal, Ritu [1 ]
Sabharwal, Sangeeta [1 ]
机构
[1] Netaji Subhas Univ Technol, Dept Comp Engn, Delhi, India
关键词
Prioritization; Convolutional neural network; Vulnerability description; Severity; VRSS;
D O I
10.1007/s13198-020-01021-7
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Whenever a vulnerability is detected by the testing team, it is described based on its characteristics and a detailed overview of the vulnerability is given by the testing team. Usually, there are certain features or keywords that points towards the possible severity level of a vulnerability. Using these keywords in the vulnerability description, a possible estimation of the severity level of vulnerabilities can be given just by their description. In this paper, we are eliminating the need for generating a severity score for software vulnerabilities by using the description of a vulnerability for their prioritization. This study makes use of word embedding and convolution neural network (CNN). The CNN is trained with sufficient samples vulnerability descriptions from all the categories, so that it can capture discriminative words and features for the categorization task. The proposed system helps to channelize the efforts of the testing team by prioritizing the newly found vulnerabilities in three categories based on previous data. The dataset includes three data samples from three different vendors and two mixed vendor data samples.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [31] Prioritization of Flood Vulnerability Zones Using Remote Sensing and GIS for Hydrological Modelling
    Anees, Mohd Talha
    Abdullah, K.
    Nawawi, M. N. M.
    Rahman, Nik Norulaini Nik A.
    Ismail, Ahmad Zuhdi
    Syakir, M. I.
    Kadir, Mohd Omar Abdul
    [J]. IRRIGATION AND DRAINAGE, 2019, 68 (02) : 176 - 190
  • [32] A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics
    Sultana K.Z.
    Boyd C.B.
    Williams B.J.
    [J]. SN Computer Science, 4 (5)
  • [33] Identification and Prioritization of Food Insecurity and Vulnerability Indices in Iran
    Abolhassani, Mohammad Hassan
    Kolahdooz, Fariba
    Majdzadeh, Reza
    Eshraghian, Mohammadreza
    Shaneshin, Mahboubeh
    Jang, Se Lim
    Djazayery, Abolghasem
    [J]. IRANIAN JOURNAL OF PUBLIC HEALTH, 2015, 44 (02) : 244 - 253
  • [34] Distributed Analysis Tool for Vulnerability Prioritization in Corporate Networks
    Walkowski, Michal
    Krakowiak, Maciej
    Oko, Jacek
    Sujecki, Slawomir
    [J]. 2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 344 - 349
  • [35] Context-Based Vulnerability Risk Scoring and Prioritization
    Shah, Dhruv Prashant
    Patel, Shreyans Munesh
    Tailor, Jainam Vinay
    Bhagat, Shubh Rajiv Kumar
    Nanade, Archana
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 1, 2023, 473 : 685 - 693
  • [36] CAVP: A context-aware vulnerability prioritization model
    Jung, Bill
    Li, Yan
    Bechor, Tamir
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [37] Software Vulnerability Detection Using Deep Neural Networks: A Survey
    Lin, Guanjun
    Wen, Sheng
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    [J]. PROCEEDINGS OF THE IEEE, 2020, 108 (10) : 1825 - 1848
  • [38] Optimizing software vulnerability detection using RoBERTa and machine learning
    Do, Cho Xuan
    Luu, Nguyen Trong
    Nguyen, Phuong Thi Lan
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)
  • [39] Software security evaluation using multilevel vulnerability discovery modeling
    Sharma, Ruchi
    Shrivastava, Avinash K.
    Hoang Pham
    [J]. QUALITY ENGINEERING, 2023, 35 (02) : 341 - 352
  • [40] Automated Software Vulnerability Testing Using Deep Learning Methods
    Kuznetsov, Alexandr
    Yeromin, Yehor
    Shapoval, Oleksiy
    Chernov, Kyrylo
    Popova, Mariia
    Serdukov, Kostyantyn
    [J]. 2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 837 - 841