A tree-based machine learning methodology to automatically classify software vulnerabilities

被引:4
|
作者
Aivatoglou, Georgios [1 ]
Anastasiadis, Mike [1 ]
Spanos, Georgios [1 ]
Voulgaridis, Antonis [1 ]
Votis, Konstantinos [1 ]
Tzovaras, Dimitrios [1 ]
机构
[1] Informat Technol Inst, Ctr Res & Technol Hellas, Thessaloniki, Greece
基金
欧盟地平线“2020”;
关键词
Software Vulnerability categorization; Cyber-security; Machine Learning; Decision Trees; Random Forests; Gradient Boosting;
D O I
10.1109/CSR51186.2021.9527965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities have become a major problem for the security analysts, since the number of new vulnerabilities is constantly growing. Thus, there was a need for a categorization system, in order to group and handle these vulnerabilities in a more efficient way. Hence, the MITRE corporation introduced the Common Weakness Enumeration that is a list of the most common software and hardware vulnerabilities. However, the manual task of understanding and analyzing new vulnerabilities by security experts, is a very slow and exhausting process. For this reason, a new automated classification methodology is introduced in this paper, based on the vulnerability textual descriptions from National Vulnerability Database. The proposed methodology, combines textual analysis and tree-based machine learning techniques in order to classify vulnerabilities automatically. The results of the experiments showed that the proposed methodology performed pretty well achieving an overall accuracy close to 80%.
引用
收藏
页码:312 / 317
页数:6
相关论文
共 50 条
  • [31] Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms
    Lei, Miaomiao
    Ge, Jidong
    Li, Zhongjin
    Li, Chuanyi
    Zhou, Yemao
    Zhou, Xiaoyu
    Luo, Bin
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), 2017, 10179 : 3 - 17
  • [32] Automatically classifying source code using tree-based approaches
    Anh Viet Phan
    Phuong Ngoc Chau
    Minh Le Nguyen
    Lam Thu Bui
    DATA & KNOWLEDGE ENGINEERING, 2018, 114 : 12 - 25
  • [33] Tree-based methods for classifying software failures
    Francis, P
    Leon, D
    Minch, M
    Podgurski, A
    15TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2004, : 451 - 462
  • [34] Unsupervised Feature Learning Methodology for Tree based Classifier and SVM to Classify Encrypted Traffic
    Ramraj, S.
    Usha, G.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (02) : 899 - 904
  • [35] Analysis of Software Vulnerabilities Using Machine Learning Techniques
    Diako, Doffou Jerome
    Achiepo, Odilon Yapo M.
    Mensah, Edoete Patrice
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2019), 2020, 311 : 30 - 37
  • [36] Assessment of flood susceptibility prediction based on optimized tree-based machine learning models
    Eslaminezhad, Seyed Ahmad
    Eftekhari, Mobin
    Azma, Aliasghar
    Kiyanfar, Ramin
    Akbari, Mohammad
    JOURNAL OF WATER AND CLIMATE CHANGE, 2022, 13 (06) : 2353 - 2385
  • [37] MACHINE LEARNING TO JUDGE LABOR RELATIONS' HARMONIOUSNESS BASED ON DECISION TREE-BASED METHOD
    Chen, Tianxue
    Yang, Heqing
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 243 - 246
  • [38] Flood susceptibility prediction using tree-based machine learning models in the GBA
    Lyu, Hai -Min
    Yin, Zhen-Yu
    SUSTAINABLE CITIES AND SOCIETY, 2023, 97
  • [39] Tree-based machine learning performed in-memory with memristive analog CAM
    Giacomo Pedretti
    Catherine E. Graves
    Sergey Serebryakov
    Ruibin Mao
    Xia Sheng
    Martin Foltin
    Can Li
    John Paul Strachan
    Nature Communications, 12
  • [40] Tree-based machine learning performed in-memory with memristive analog CAM
    Pedretti, Giacomo
    Graves, Catherine E.
    Serebryakov, Sergey
    Mao, Ruibin
    Sheng, Xia
    Foltin, Martin
    Li, Can
    Strachan, John Paul
    NATURE COMMUNICATIONS, 2021, 12 (01)