A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages

被引:2
|
作者
Antal, Gabor [1 ]
Mosolygo, Balazs [1 ]
Vandor, Norbert [1 ]
Hegedus, Peter [1 ,2 ]
机构
[1] Univ Szeged, Dept Software Engn, Szeged, Hungary
[2] MTA SZTE Res Grp Artificial Intelligence, Szeged, Hungary
关键词
CVE; CWE; Data mining; Software security; Vulnerability analysis;
D O I
10.1007/978-3-030-58811-3_72
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The number of people accessing online services is increasing day by day, and with new users, comes a greater need for effective and responsive cyber-security. Our goal in this study was to find out if there are common patterns within the most widely used programming languages in terms of security issues and fixes. In this paper, we showcase some statistics based on the data we extracted for these languages. Analyzing the more popular ones, we found that the same security issues might appear differently in different languages, and as such the provided solutions may vary just as much. We also found that projects with similar sizes can produce extremely different results, and have different common weaknesses, even if they provide a solution to the same task. These statistics may not be entirely indicative of the projects' standards when it comes to security, but they provide a good reference point of what one should expect. Given a larger sample size they could be made even more precise, and as such a better understanding of the security relevant activities within the projects written in given languages could be achieved.
引用
收藏
页码:1019 / 1034
页数:16
相关论文
共 50 条
  • [1] The Study of Customer Relationship Management Based on Data-Mining
    Yuan, Yongke
    Wang, Wei
    Shi, Feng
    INFORMATION SYSTEMS IN THE CHANGING ERA: THEORY AND PRACTICE, 2009, : 432 - +
  • [2] Glucose Data-Mining Study Inconclusive
    Cembrowski, George
    Lyon, Martha E.
    Klonoff, David C.
    CANADIAN JOURNAL OF DIABETES, 2015, 39 (05) : 354 - 355
  • [3] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao (Xi’an Jiaotong University
    Journal of Electronics(China), 2005, (06) : 39 - 45
  • [4] DATA-MINING BASED FAULT DETECTION
    Ma Hongguang Han Chongzhao Xian Jiaotong University Xian China Wang Guohua Xu Jianfeng Zhu Xiaofei Research Institute of High Technology Xian China
    Journal of Electronics, 2005, (06)
  • [5] Study on K-means Method Based on Data-Mining
    Qiao, Jia
    Zhang, Yong
    2015 CHINESE AUTOMATION CONGRESS (CAC), 2015, : 51 - 54
  • [6] Development of an information security data-mining system for a situation center
    T. I. Buldakova
    A. Sh. Dzhalolov
    Automatic Documentation and Mathematical Linguistics, 2014, 48 (2) : 71 - 77
  • [7] Development of an Information Security Data-Mining System for a Situation Center
    Buldakova, T. I.
    Dzhalolov, A. Sh.
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2014, 48 (02) : 71 - 77
  • [8] Security Data Mining in an Ontology for Vulnerability Management
    Wang, Ju An
    Guo, Minzhe
    2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS, 2009, : 597 - 603
  • [9] Research on the Data Mining Method based on Information Security Vulnerability Ontology
    Zhang Han
    Lv Yali
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 251 - 256
  • [10] Data-mining by probability-based patterns
    Karegar, M.
    Isazadeh, A.
    Fartash, F.
    Saderi, T.
    Navin, A. Habibizad
    PROCEEDINGS OF THE ITI 2008 30TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2008, : 353 - +