A novel approach for software vulnerability detection based on intelligent cognitive computing

被引:0
|
作者
Cho Do Xuan
Dao Hoang Mai
Ma Cong Thanh
Bui Van Cong
机构
[1] Posts and Telecommunications Institute of Technology,Faculty of Information Security
[2] The University of Edinburgh,Department of Information Technology
[3] University of Economics and Technical Industries,undefined
来源
关键词
Source code vulnerability; Source code vulnerability detection; Code property graph; Source embedding; Data rebalancing; Feature learning; Classification;
D O I
暂无
中图分类号
学科分类号
摘要
Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advanced computational algorithms. It's a combination of four main processing techniques including (i) Source Embedding, (ii) Feature Learning, (iii) Resampling Data, and (iv) Classification. The Source Embedding method will perform the task of analyzing and standardizing the source code based on the Joern tool and the data mining algorithm. The Feature Learning model has the function of aggregating and extracting source code attribute based on node using machine learning and deep learning methods. The Resampling Data technique will perform equalization of the experimental dataset. Finally, the Classification model has the function of detecting source code vulnerabilities. The novelty and uniqueness of the new intelligent cognitive computing method is the combination and synchronous use of many different data extracting techniques to compute, represent, and extract the properties of the source code. With this new calculation method, many significant unusual properties and features of the vulnerability have been synthesized and extracted. To prove the superiority of the proposed method, we experiment to detect source code vulnerabilities based on the Verum dataset, details of this part are presented in the experimental section. The experimental results show that the method proposed in the paper has brought good results on all measures. These results have shown to be the best research results for the source code vulnerability detection task using the Verum dataset according to our survey to date. With such results, the proposal in this study is not only meaningful in terms of science but also in practical terms when the method of using intelligent cognitive computing techniques to analyze and evaluate source code has helped to improve the efficiency of the source code analysis and vulnerability detection process.
引用
收藏
页码:17042 / 17078
页数:36
相关论文
共 50 条
  • [31] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    Security and Communication Networks, 2022, 2022
  • [32] Automatic Software Vulnerability Detection Based on Guided Deep Fuzzing
    Cai, Jun
    Yang, Shangfei
    Men, Jinquan
    He, Jun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 231 - 234
  • [33] Automated Software Vulnerability Detection Based on Hybrid Neural Network
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Tang, Qifeng
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [34] Transformer-Based Language Models for Software Vulnerability Detection
    Thapa, Chandra
    Jang, Seung Ick
    Ahmed, Muhammad Ejaz
    Camtepe, Seyit
    Pieprzyk, Josef
    Nepal, Surya
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 481 - 496
  • [35] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Cognitive computing for intelligent multimedia systems
    Multimedia Tools and Applications, 2020, 79 : 14317 - 14317
  • [37] Software Vulnerability Detection Based on Code Coverage and Test Cost
    Shuai, Bo
    Li, Haifeng
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 317 - 321
  • [38] Cognitive computing for intelligent multimedia systems
    Li, Yujie
    Wu, Liao
    Wang, Dong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (21-22) : 14317 - 14317
  • [39] Cognitive computing for intelligent application and service
    Zhang, Yin
    Abbas, Haider
    Li, Yujie
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (09): : 4315 - 4316
  • [40] Software vulnerability detection system based on uniform intermediate representation
    Wang, Jinding
    Wang, Jiajie
    Cheng, Shaoyin
    Jiang, Fan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1502 - 1507