Software vulnerability prioritization using vulnerability description

被引:0
|
作者
Sharma, Ruchi [1 ]
Sibal, Ritu [1 ]
Sabharwal, Sangeeta [1 ]
机构
[1] Netaji Subhas Univ Technol, Dept Comp Engn, Delhi, India
关键词
Prioritization; Convolutional neural network; Vulnerability description; Severity; VRSS;
D O I
10.1007/s13198-020-01021-7
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Whenever a vulnerability is detected by the testing team, it is described based on its characteristics and a detailed overview of the vulnerability is given by the testing team. Usually, there are certain features or keywords that points towards the possible severity level of a vulnerability. Using these keywords in the vulnerability description, a possible estimation of the severity level of vulnerabilities can be given just by their description. In this paper, we are eliminating the need for generating a severity score for software vulnerabilities by using the description of a vulnerability for their prioritization. This study makes use of word embedding and convolution neural network (CNN). The CNN is trained with sufficient samples vulnerability descriptions from all the categories, so that it can capture discriminative words and features for the categorization task. The proposed system helps to channelize the efforts of the testing team by prioritizing the newly found vulnerabilities in three categories based on previous data. The dataset includes three data samples from three different vendors and two mixed vendor data samples.
引用
收藏
页码:58 / 64
页数:7
相关论文
共 50 条
  • [41] Software Vulnerability Detection Using Informed Code Graph Pruning
    Gear, Joseph
    Xu, Yue
    Foo, Ernest
    Gauravaram, Praveen
    Jadidi, Zahra
    Simpson, Leonie
    [J]. IEEE ACCESS, 2023, 11 : 135626 - 135644
  • [42] CLORIFI: software vulnerability discovery using code clone verification
    Li, Hongzhe
    Kwon, Hyuckmin
    Kwon, Jonghoon
    Lee, Heejo
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1900 - 1917
  • [43] Using Historical Software Vulnerability Data to Forecast Future Vulnerabilities
    Last, David
    [J]. 2015 RESILIENCE WEEK (RSW), 2015, : 120 - 126
  • [44] Vulnerability and Trust: An attempt at phenomenological description
    Quepons, Ignacio
    [J]. PHAENEX-JOURNAL OF EXISTENTIAL AND PHENOMENOLOGICAL THEORY AND CULTURE, 2020, 13 (02): : 1 - 10
  • [45] Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph
    Du, Dongdong
    Ren, Xingzhang
    Wu, Yupeng
    Chen, Jien
    Ye, Wei
    Sun, Jinan
    Xi, Xiangyu
    Gao, Qing
    Zhang, Shikun
    [J]. WEB ENGINEERING, ICWE 2018, 2018, 10845 : 33 - 49
  • [46] Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning
    Ullman, Steven
    Samtani, Sagar
    Zhu, Hongyi
    Lazarine, Ben
    Chen, Hsinchun
    Nunamaker Jr, Jay F.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2024, 41 (03) : 708 - 743
  • [47] Vulnerability diffusions in software product networks
    Kang, Martin
    Templeton, Gary
    Um, SungYong
    [J]. JOURNAL OF OPERATIONS MANAGEMENT, 2023, 69 (08) : 1342 - 1370
  • [48] Determinants of Software Vulnerability Disclosure Timing
    Sen, Ravi
    Choobineh, Joobin
    Kumar, Subodha
    [J]. PRODUCTION AND OPERATIONS MANAGEMENT, 2020, 29 (11) : 2532 - 2552
  • [49] Vulnerability Analysis of Software Defined Networking
    Zerkane, Salaheddine
    Espes, David
    Le Parc, Philippe
    Cuppens, Frederic
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 97 - 116
  • [50] Survey of Software Vulnerability Discovery Technology
    Wang, Wei
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK, COMMUNICATION AND EDUCATION (SNCE 2017), 2017, 82 : 9 - 13