Extracting rules for vulnerabilities detection with static metrics using machine learning

被引:14
|
作者
Gupta, Aakanshi [1 ]
Suri, Bharti [2 ]
Kumar, Vijay [3 ]
Jain, Pragyashree [4 ]
机构
[1] GGS Indraprastha Univ, ASET, New Delhi, India
[2] GGS Indraprastha Univ, Univ Sch ICT, New Delhi, India
[3] Amity Univ Uttar Pradesh, Dept Math, Amity Inst Appl Sci, Noida, India
[4] Amity Sch Engn & Technol, New Delhi, India
关键词
Software metrics; Machine learning; Static code analysis; Supervised learning;
D O I
10.1007/s13198-020-01036-0
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Software quality is the prime solicitude in software engineering and vulnerability is one of the major threat in this respect. Vulnerability hampers the security of the software and also impairs the quality of the software. In this paper, we have conducted experimental research on evaluating the utility of machine learning algorithms to detect the vulnerabilities. To execute this experiment; a set of software metrics was extracted using machine learning in the form of easily accessible laws. Here, 32 supervised machine learning algorithms have been considered for 3 most occurred vulnerabilities namely:Lawofdemeter,BeanMemberShouldSerialize,andLocalVariablecouldBeFinalin a software system. Using the J48 machine learning algorithm in this research, up to 96% of accurate result in vulnerability detection was achieved. The results are validated against tenfold cross validation and also, the statistical parameters like ROC curve, Kappa statistics; Recall, Precision, etc. have been used for analyzing the result.
引用
收藏
页码:65 / 76
页数:12
相关论文
共 50 条
  • [31] Fault prediction based on software metrics and SonarQube rules. Machine or deep learning?
    Lomio, Francesco
    Moreschini, Sergio
    Lenarduzzi, Valentina
    [J]. arXiv, 2021,
  • [32] Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study
    Sayuri Matsunaga, Ana Paula
    Antunes, Nuno
    Moraes, Regina
    [J]. 2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 45 - 52
  • [33] Extracting IP parameters of rock samples using machine learning
    He, Ziang
    Cai, Hongzhu
    Li, Shuai
    Xian, Jinchi
    Hu, Xiangyun
    [J]. GEOPHYSICAL JOURNAL INTERNATIONAL, 2023, 235 (01) : 862 - 878
  • [34] Automated Lung Cancer Detection based on Multimodal Features Extracting Strategy Using Machine Learning Techniques
    Hussain, Lal
    Rathore, Saima
    Abbasi, Adeel Ahmed
    Saeed, Sharjil
    [J]. MEDICAL IMAGING 2019: PHYSICS OF MEDICAL IMAGING, 2019, 10948
  • [35] Association Rules and Machine Learning for Enhancing Undeclared Work Detection
    Alogogianni, Eleni
    Virvou, Maria
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2020), 2020, : 419 - 426
  • [36] Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
    Cheng, Xiao
    Wang, Haoyu
    Hua, Jiayi
    Zhang, Miao
    Xu, Guoai
    Yi, Li
    Sui, Yulei
    [J]. 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 41 - 50
  • [37] Extracting Implicit Programming Rules: Comparing Static and Dynamic Approaches
    Zaman, Tarannum Shaila
    Yu, Tingting
    [J]. SOFTWAREMINING '18: PROCEEDINGS OF THE 7TH INTERNATIONAL WORKSHOP ON SOFTWARE MINING, 2018, : 1 - 7
  • [38] Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis
    Akter, Mst Shapna
    Shahriar, Hossain
    Iqbal, Iysa
    Hossain, M. D.
    Karim, M. A.
    Clincy, Victor
    Voicu, Razvan
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SERVICES ENGINEERING, SSE, 2023, : 222 - 231
  • [39] Detection of vulnerabilities in blockchain smart contracts using deep learning
    Gupta, Namya Aankur
    Bansal, Mansi
    Sharma, Seema
    Mehrotra, Deepti
    Kakkar, Misha
    [J]. WIRELESS NETWORKS, 2024,
  • [40] Determining context of association rules by using machine learning
    Nisar, Kanwal
    Shaheen, Muhammad
    [J]. JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2023, 35 (01) : 59 - 76