A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages

被引:2
|
作者
Antal, Gabor [1 ]
Mosolygo, Balazs [1 ]
Vandor, Norbert [1 ]
Hegedus, Peter [1 ,2 ]
机构
[1] Univ Szeged, Dept Software Engn, Szeged, Hungary
[2] MTA SZTE Res Grp Artificial Intelligence, Szeged, Hungary
关键词
CVE; CWE; Data mining; Software security; Vulnerability analysis;
D O I
10.1007/978-3-030-58811-3_72
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The number of people accessing online services is increasing day by day, and with new users, comes a greater need for effective and responsive cyber-security. Our goal in this study was to find out if there are common patterns within the most widely used programming languages in terms of security issues and fixes. In this paper, we showcase some statistics based on the data we extracted for these languages. Analyzing the more popular ones, we found that the same security issues might appear differently in different languages, and as such the provided solutions may vary just as much. We also found that projects with similar sizes can produce extremely different results, and have different common weaknesses, even if they provide a solution to the same task. These statistics may not be entirely indicative of the projects' standards when it comes to security, but they provide a good reference point of what one should expect. Given a larger sample size they could be made even more precise, and as such a better understanding of the security relevant activities within the projects written in given languages could be achieved.
引用
收藏
页码:1019 / 1034
页数:16
相关论文
共 50 条
  • [21] Development of a Data-Mining Technique for Regional-Scale Evaluation of Building Seismic Vulnerability
    Zhang, Zhenyu
    Hsu, Ting-Yu
    Wei, Hsi-Hsien
    Chen, Jieh-Haur
    APPLIED SCIENCES-BASEL, 2019, 9 (07):
  • [22] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377
  • [23] ADMIDS: A new type of IDS based on agent data-mining
    Lee, Y
    Wang, W
    Luo, JZ
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL III, PTS A AND B, 2002, 3 : 743 - 749
  • [24] Knowledge Management in the Industry Based on the Use of Data-Mining Techniques
    He, Mao
    Chen, Juan
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 171 - +
  • [25] PREGO: A Literature and Data-Mining Resource to Associate Microorganisms, Biological Processes, and Environment Types
    Zafeiropoulos, Haris
    Paragkamian, Savvas
    Ninidakis, Stelios
    Pavlopoulos, Georgios A.
    Jensen, Lars Juhl
    Pafilis, Evangelos
    MICROORGANISMS, 2022, 10 (02)
  • [26] Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
    Ghaffarian, Seyed Mohammad
    Shahriari, Hamid Reza
    ACM COMPUTING SURVEYS, 2017, 50 (04)
  • [27] Research on Intelligent Tutoring System Based on Data-mining Algorithms
    Chen Yixuan
    Zhang Yang
    2019 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2019, : 443 - 446
  • [28] Data-Mining Twitter and the Autism Spectrum Disorder: A Pilot Study
    Beykikhoshk, Adham
    Arandjelovic, Ognjen
    Phung, Dinh
    Venkatesh, Svetha
    Caelli, Terry
    2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 349 - 356
  • [29] Research on improved Data-Mining Algorithm based on Strong Correlation
    Hu, Chunhong
    Wang, Zhengqiang
    SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 423 - +
  • [30] Malicious VBScript Detection Algorithm Based on Data-Mining Techniques
    Wael, Doaa
    Shosha, Ahmed
    Sayed, Samir G.
    2017 INTL CONF ON ADVANCED CONTROL CIRCUITS SYSTEMS (ACCS) SYSTEMS & 2017 INTL CONF ON NEW PARADIGMS IN ELECTRONICS & INFORMATION TECHNOLOGY (PEIT), 2017, : 112 - 116