• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

考察文本挖掘和软件度量在漏洞预测中的能力。

Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction.

作者信息

Kalouptsoglou Ilias, Siavvas Miltiadis, Kehagias Dionysios, Chatzigeorgiou Alexandros, Ampatzoglou Apostolos

机构信息

Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece.

Department of Applied Informatics, University of Macedonia, 54636 Thessaloniki, Greece.

出版信息

Entropy (Basel). 2022 May 5;24(5):651. doi: 10.3390/e24050651.

DOI:10.3390/e24050651
PMID:35626536
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9140602/
Abstract

Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the identification (and, in turn, the mitigation) of vulnerabilities early enough during the software development cycle. The scientific community has recently focused a lot of attention on developing Deep Learning models using text mining techniques for predicting the existence of vulnerabilities in software components. However, there are also studies that examine whether the utilization of statically extracted software metrics can lead to adequate Vulnerability Prediction Models. In this paper, both software metrics- and text mining-based Vulnerability Prediction Models are constructed and compared. A combination of software metrics and text tokens using deep-learning models is examined as well in order to investigate if a combined model can lead to more accurate vulnerability prediction. For the purposes of the present study, a vulnerability dataset containing vulnerabilities from real-world software products is utilized and extended. The results of our analysis indicate that text mining-based models outperform software metrics-based models with respect to their F-score, whereas enriching the text mining-based models with software metrics was not found to provide any added value to their predictive performance.

摘要

对于希望向消费者提供高质量和可靠软件的软件开发组织来说,软件安全是一个非常重要的方面。软件安全的一个关键部分是早期发现软件漏洞。漏洞预测是一种机制,可在软件开发周期中尽早促进漏洞的识别(进而缓解)。科学界最近将大量注意力集中在使用文本挖掘技术开发深度学习模型,以预测软件组件中漏洞的存在。然而,也有研究探讨静态提取的软件度量的使用是否能产生足够的漏洞预测模型。在本文中,构建并比较了基于软件度量和基于文本挖掘的漏洞预测模型。还研究了使用深度学习模型将软件度量和文本令牌相结合,以调查组合模型是否能导致更准确的漏洞预测。出于本研究的目的,利用并扩展了一个包含来自实际软件产品漏洞的漏洞数据集。我们的分析结果表明,基于文本挖掘的模型在F分数方面优于基于软件度量的模型,而用软件度量丰富基于文本挖掘的模型并未发现能为其预测性能提供任何附加值。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/18a20166300b/entropy-24-00651-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/65a8b3a1be5d/entropy-24-00651-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/796233ac2886/entropy-24-00651-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/27e65cc8d5c1/entropy-24-00651-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/dedb7d1cbaec/entropy-24-00651-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/e2b8b82e4f33/entropy-24-00651-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/5d0f5e5cd00f/entropy-24-00651-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/8bf953c643f1/entropy-24-00651-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/10cf50281308/entropy-24-00651-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/54f95eda0b8c/entropy-24-00651-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/18a20166300b/entropy-24-00651-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/65a8b3a1be5d/entropy-24-00651-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/796233ac2886/entropy-24-00651-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/27e65cc8d5c1/entropy-24-00651-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/dedb7d1cbaec/entropy-24-00651-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/e2b8b82e4f33/entropy-24-00651-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/5d0f5e5cd00f/entropy-24-00651-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/8bf953c643f1/entropy-24-00651-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/10cf50281308/entropy-24-00651-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/54f95eda0b8c/entropy-24-00651-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab03/9140602/18a20166300b/entropy-24-00651-g010.jpg

相似文献

1
Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction.考察文本挖掘和软件度量在漏洞预测中的能力。
Entropy (Basel). 2022 May 5;24(5):651. doi: 10.3390/e24050651.
2
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.具有新型代价函数和自定义训练词向量嵌入的改进型漏洞利用预测模型。
Sensors (Basel). 2021 Jun 20;21(12):4220. doi: 10.3390/s21124220.
3
Efficient Feature Selection for Static Analysis Vulnerability Prediction.静态分析漏洞预测中的有效特征选择。
Sensors (Basel). 2021 Feb 6;21(4):1133. doi: 10.3390/s21041133.
4
Validation of text-mining and content analysis techniques using data collected from veterinary practice management software systems in the UK.使用从英国兽医实践管理软件系统收集的数据对文本挖掘和内容分析技术进行验证。
Prev Vet Med. 2019 Jun 1;167:61-67. doi: 10.1016/j.prevetmed.2019.02.015. Epub 2019 Mar 14.
5
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm.FastEmbed:基于集成机器学习算法的漏洞利用可能性预测。
PLoS One. 2020 Feb 6;15(2):e0228439. doi: 10.1371/journal.pone.0228439. eCollection 2020.
6
Text-mining-based feature selection for anticancer drug response prediction.基于文本挖掘的特征选择用于抗癌药物反应预测。
Bioinform Adv. 2024 Mar 26;4(1):vbae047. doi: 10.1093/bioadv/vbae047. eCollection 2024.
7
A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning.基于信息图和集成学习的新型智能合约漏洞检测方法。
Sensors (Basel). 2022 May 8;22(9):3581. doi: 10.3390/s22093581.
8
Prediction of Neurological Outcomes in Out-of-hospital Cardiac Arrest Survivors Immediately after Return of Spontaneous Circulation: Ensemble Technique with Four Machine Learning Models.院外心脏骤停幸存者自主循环恢复后即刻的神经功能结局预测:四种机器学习模型的集成技术。
J Korean Med Sci. 2021 Jul 19;36(28):e187. doi: 10.3346/jkms.2021.36.e187.
9
Machine Learning-Based Software Defect Prediction for Mobile Applications: A Systematic Literature Review.基于机器学习的移动应用程序软件缺陷预测:系统文献综述。
Sensors (Basel). 2022 Mar 26;22(7):2551. doi: 10.3390/s22072551.
10
Mood detection and prediction using conventional machine learning techniques on COVID19 data.使用传统机器学习技术对新冠病毒数据进行情绪检测与预测。
Soc Netw Anal Min. 2022;12(1):139. doi: 10.1007/s13278-022-00957-x. Epub 2022 Sep 21.

引用本文的文献

1
Cross-site scripting attack detection based on a modified convolution neural network.基于改进卷积神经网络的跨站脚本攻击检测
Front Comput Neurosci. 2022 Aug 29;16:981739. doi: 10.3389/fncom.2022.981739. eCollection 2022.