Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security

被引:21
|
作者
Zhang, Mengyuan [1 ,2 ]
de Carnavalet, Xavier de Carne [1 ]
Wang, Lingyu [1 ]
Ragab, Ahmed [3 ,4 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 1M8, Canada
[2] Ericsson Res, Montreal, PQ H4S 0B6, Canada
[3] Ecole Polytech Montreal, Math & Ind Engn Dept, Montreal, PQ H3C 3A7, Canada
[4] Menoufia Univ, Fac Elect Engn, Dept Ind Elect & Control Engn, Menoufia 32952, Egypt
基金
加拿大自然科学与工程研究理事会;
关键词
Software vulnerability analysis; vulnerability discovery model; software security; machine learning; COMPLEXITY;
D O I
10.1109/TIFS.2019.2895963
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing research on vulnerability discovery models shows that the existence of vulnerabilities inside an application may be linked to certain features, e.g., size or complexity, of that application. However, the applicability of such features to demonstrate the relative security between two applications is not well studied, which may depend on multiple factors in a complex way. In this paper, we perform the first large-scale empirical study of the correlation between various features of applications and the abundance of vulnerabilities. Unlike existing work, which typically focuses on one particular application, resulting in limited successes, we focus on the more realistic issue of assessing the relative security level among different applications. To the best of our knowledge, this is the most comprehensive study of 780 real-world applications involving 6498 vulnerabilities. We apply seven feature selection methods to nine feature subsets selected among 34 collected features, which are then fed into six types of machine learning models, producing 523 estimations. The predictive power of important features is evaluated using four different performance measures. This paper reflects that the complexity of applications is not the only factor in vulnerability discovery and the human-related factors contribute to explaining the number of discovered vulnerabilities in an application.
引用
收藏
页码:2315 / 2330
页数:16
相关论文
共 50 条
  • [1] PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
    Li, Qiang
    Song, Jinke
    Tan, Dawei
    Wang, Haining
    Liu, Jiqiang
    [J]. 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021), 2021, : 161 - 173
  • [2] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
    Iosif, Andrei-Cristian
    Gasiba, Tiago Espinha
    Zhao, Tiange
    Lechner, Ulrike
    Pinto-Albuquerque, Maria
    [J]. UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
  • [3] A Large-Scale Empirical Study of Security Patches
    Li, Frank
    Paxson, Vern
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2201 - 2215
  • [4] The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
    Iannone, Emanuele
    Guadagni, Roberta
    Ferrucci, Filomena
    De Lucia, Andrea
    Palomba, Fabio
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (01) : 44 - 63
  • [5] Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field
    Lips, Silvia
    Pappel, Ingrid
    Tsap, Valentyna
    Draheim, Dirk
    [J]. ELECTRONIC GOVERNMENT AND THE INFORMATION SYSTEMS PERSPECTIVE, EGOVIS 2018, 2018, 11032 : 60 - 70
  • [6] A Large-Scale Study on Vulnerabilities in Linux using Vtopia
    Shao, Yanjie
    Wu, Yanjun
    Yang, Mutian
    Luo, Tianyue
    Wu, Jingzheng
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1033 - 1042
  • [7] A Large-Scale Empirical Study of Conficker
    Shin, Seungwon
    Gu, Guofei
    Reddy, Narasimha
    Lee, Christopher P.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 676 - 690
  • [8] Large-Scale Ejecta of Z CMa-Proper Motion Study and New Features Discovered
    Liimets, Tiina
    Kraus, Michaela
    Cidale, Lydia
    Karpov, Sergey
    Marston, Anthony
    [J]. GALAXIES, 2023, 11 (03):
  • [9] Conficker and Beyond: A Large-Scale Empirical Study
    Shin, Seungwon
    Gu, Guofei
    [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 151 - 160
  • [10] Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study
    Guo, Yao
    Wang, Chengke
    Chen, Xiangqun
    [J]. IEEE ACCESS, 2017, 5 : 13387 - 13400