Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets

被引:0
|
作者
Okutan, Ahmet [1 ]
Mirakhorli, Mehdi [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
关键词
Software Vulnerability; CVE; CVSS Scoring; Exploitability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Common Vulnerability and Exposure (CVE) reports published by Vulnerability Management Systems (VMSs) are used to evaluate the severity and exploitability of software vulnerabilities. Public vulnerability databases such as NVD uses the Common Vulnerability Scoring System (CVSS) to assign various scores to CVEs to evaluate their base severity, impact, and exploitability. Previous studies have shown that vulnerability databases rely on a manual, labor-intensive and error-prone process which may lead to inconsistencies in the CVE data and delays in the releasing of new CVEs. Furthermore, it was shown that CVSS scoring is based on complex calculations and may not be accurate enough in assessing the potential severity and exploitability of vulnerabilities in real life. This work uses Convolutional Neural Networks (CNN) to train text classification models to automate the prediction of the severity and exploitability of CVEs, and proposes a new exploitability scoring method by creating a Product Hygiene Index based on the Common Product Enumeration (CPE) catalog. Using CVE descriptions published by the NVD and the exploits identified by exploit databases, it trains CNN models to predict the base severity and exploitability of CVEs. Preliminary experiment results and the conducted case study indicate that the severity of CVEs can be predicted automatically with high confidences, and the proposed exploitability scoring method achieves better results compared to the exploitability scoring provided by the NVD.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability
    Lyu, Jinghui
    Bai, Yude
    Xing, Zhenchang
    Li, Xiaohong
    Ge, Weimin
    2021 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2021), 2021, : 119 - 126
  • [2] Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
    Nakagawa, Shunta .
    Nagai, Tatsuya
    Kanehara, Hideaki
    Furumoto, Keisuke
    Takita, Makoto
    Shiraishi, Yoshiaki
    Takahashi, Takeshi
    Mohri, Masami
    Takano, Yasuhiro
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09) : 1679 - 1682
  • [3] Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
    Suciu, Octavian
    Nelson, Connor
    Lyu, Zhuoer
    Bao, Tiffany
    Dumitras, Tudor
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 377 - 394
  • [4] Predicting rainfall using neural nets
    Htike, Kyaw Kyaw
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 17 (04) : 353 - 364
  • [5] Using convolutional neural networks to identify patient safety incident reports by type and severity
    Wang, Ying
    Coiera, Enrico
    Magrabi, Farah
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2019, 26 (12) : 1600 - 1608
  • [6] Recognizing Objectionable Images Using Convolutional Neural Nets
    Moradi, Reza
    Yousefzadeh, Rahman
    2015 SIGNAL PROCESSING AND INTELLIGENT SYSTEMS CONFERENCE (SPIS), 2015, : 133 - 137
  • [7] Predicting acute pancreatitis severity with enhanced computed tomography scans using convolutional neural networks
    Liang, Hongyin
    Wang, Meng
    Wen, Yi
    Du, Feizhou
    Jiang, Li
    Geng, Xuelong
    Tang, Lijun
    Yan, Hongtao
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [8] Predicting acute pancreatitis severity with enhanced computed tomography scans using convolutional neural networks
    Hongyin Liang
    Meng Wang
    Yi Wen
    Feizhou Du
    Li Jiang
    Xuelong Geng
    Lijun Tang
    Hongtao Yan
    Scientific Reports, 13
  • [9] Assessing vulnerability exploitability risk using software properties
    Younis, Awad
    Malaiya, Yashwant K.
    Ray, Indrajit
    SOFTWARE QUALITY JOURNAL, 2016, 24 (01) : 159 - 202
  • [10] Assessing vulnerability exploitability risk using software properties
    Awad Younis
    Yashwant K. Malaiya
    Indrajit Ray
    Software Quality Journal, 2016, 24 : 159 - 202