A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages

被引:2
|
作者
Antal, Gabor [1 ]
Mosolygo, Balazs [1 ]
Vandor, Norbert [1 ]
Hegedus, Peter [1 ,2 ]
机构
[1] Univ Szeged, Dept Software Engn, Szeged, Hungary
[2] MTA SZTE Res Grp Artificial Intelligence, Szeged, Hungary
关键词
CVE; CWE; Data mining; Software security; Vulnerability analysis;
D O I
10.1007/978-3-030-58811-3_72
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The number of people accessing online services is increasing day by day, and with new users, comes a greater need for effective and responsive cyber-security. Our goal in this study was to find out if there are common patterns within the most widely used programming languages in terms of security issues and fixes. In this paper, we showcase some statistics based on the data we extracted for these languages. Analyzing the more popular ones, we found that the same security issues might appear differently in different languages, and as such the provided solutions may vary just as much. We also found that projects with similar sizes can produce extremely different results, and have different common weaknesses, even if they provide a solution to the same task. These statistics may not be entirely indicative of the projects' standards when it comes to security, but they provide a good reference point of what one should expect. Given a larger sample size they could be made even more precise, and as such a better understanding of the security relevant activities within the projects written in given languages could be achieved.
引用
收藏
页码:1019 / 1034
页数:16
相关论文
共 50 条
  • [41] THE RESEARCH AND DESIGN OF SQL PROCESSING IN A DATA-MINING SYSTEM BASED ON MAPREDUCE
    Zhang, Lei
    Li, Kaiping
    Wu, Bin
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 301 - 305
  • [42] Application of data-mining technique and hydro-chemical data for evaluating vulnerability of groundwater in Indo-Gangetic Plain
    Pal, Subodh Chandra
    Islam, Abu Reza Md Towfiqul
    Chakrabortty, Rabin
    Islam, Md Saiful
    Saha, Asish
    Shit, Manisa
    JOURNAL OF ENVIRONMENTAL MANAGEMENT, 2022, 318
  • [43] A Combined Wavelet and Data-Mining Based Intelligent Protection Scheme for Microgrid
    Samantaray, Subhransu
    Mishra, Debi
    Joos, Geza
    2018 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2018,
  • [44] A Data-Mining Model for Protection of FACTS-Based Transmission Line
    Samantaray, Subhransur
    2015 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2015,
  • [45] A data-mining approach for product conceptualization in a web-based architecture
    Yan, Wei
    Chen, Chun-Hsien
    Huang, Youfang
    Mi, Weijian
    COMPUTERS IN INDUSTRY, 2009, 60 (01) : 21 - 34
  • [46] An automatic approach to evaluate assertions' quality based on data-mining metrics
    Ghasempouri, Tara
    Azad, Siavoosh Payandeh
    Niazmand, Behrad
    Raik, Jaan
    2018 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2018), 2018, : 61 - 66
  • [47] Expected Income of New Currency in Blockchain Based on Data-Mining Technology
    Li, Xingzhou
    Zeng, Xin
    ELECTRONICS, 2020, 9 (01)
  • [48] Data-Mining models for the Diagnosis of EMG-based Neuromuscular Diseases
    Pandey, Babita
    Mishra, R. B.
    INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2011, 6 (02) : 109 - 128
  • [49] A Data-Mining Model for Protection of FACTS-Based Transmission Line
    Samantaray, S. R.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2013, 28 (02) : 612 - 618
  • [50] Data-mining based skin color detection method in compressed domain
    Zhao, Shi-Wei
    Zhuo, Li
    Wang, Su-Yu
    Shen, Lan-Sun
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (03): : 605 - 610