Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3319008.3319033acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
short-paper

A Conceptual Replication on Predicting the Severity of Software Vulnerabilities

Published: 15 April 2019 Publication History

Abstract

Software vulnerabilities may lead to crucial security risks in software systems. Thus, prioritization of the vulnerabilities is an important task for security teams, and assessing how severe the vulnerabilities are would help teams during fixing and maintenance activities. We replicated a prior work which aims to predict the severity of software vulnerabilities by grouping vulnerabilities into different severity levels. We follow their approach on feature extraction using word embeddings, and on prediction model using Convolutional Neural Networks (CNNs). In addition, Long Short Term Memory (LSTM) and Extreme Gradient Boosting (XGBoost) models are used. We also extend the replicated work by aiming to predict severity scores rather than levels. We carried out two experiments for predicting severity levels and severity scores of 82,974 vulnerabilities. On predicting the severity levels, our LSTM and CNN models perform similarly with an F1 score of 0.756 F1 score and 0.752, respectively. On predicting the severity scores, LSTM, CNN and XGBoost models perform 16.14%, 17.03%, 18.91% MAPE values, respectively.

References

[1]
{n. d.}. Common Vulnerability Scoring System SIG. https://www.first.org/cvss
[2]
{n. d.}. CVE - Common Vulnerabilities and Exposures (CVE). http://cve.mitre.org/
[3]
{n. d.}. CVSS v2 Complete Documentation. https://www.first.org/cvss/v2/guide
[4]
{n. d.}. Introduction to Boosted Trees ăĂŤ xgboost 0.81 documentation. https://xgboost.readthedocs.io/en/latest/tutorials/model.html
[5]
{n. d.}. NVD - Home. https://nvd.nist.gov/
[6]
Atlassian. {n. d.}. Severity Levels for Security Issues. https://www.atlassian.com/trust/security/security-severity-levels
[7]
Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '16. ACM Press, San Francisco, California, USA, 785--794.
[8]
Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, and Zhiyong Feng. 2017. Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, Shanghai, 125--136.
[9]
Andrew Meneely. 2015. Chapter 8 - Analyzing Security Data. In The Art and Science of Analyzing Software Data, Christian Bird, Tim Menzies, and Thomas Zimmermann (Eds.). Morgan Kaufmann, Boston, 215--229.
[10]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. arXiv.1301.37S1 {cs} (Jan. 2013). http://arxiv.org/abs/1301.3781 arXiv: 1301.3781.
[11]
Stephan Neuhaus, Thomas Zimmermann, Christian Holler, and Andreas Zeller. 2007. Predicting Vulnerable Software Components. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07). ACM, New York, NY, USA, 529--540.
[12]
Viet Hung Nguyen and Le Minh Sang Tran. 2010. Predicting Vulnerable Software Components with Dependency Graphs. In Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec '10). ACM, New York, NY, USA, 3:1--3:8.
[13]
Sefa Eren Sahin. 2019. Predict severity of software vulnerabilities using Deep Neural Networks and Gradient Boosting (XGBoost): erensahin/vulnerability-severity-predictor. https://github.com/erensahin/vulnerability-severity-predictor
[14]
R. Scandariato, J. Walden, A. Hovsepyan, and W. Joosen. 2014. Predicting Vulnerable Software Components via Text Mining. IEEE Transactions on Software Engineering 40, 10 (Oct. 2014), 993--1006.
[15]
Yonghee Shin, Andrew Meneely, Laurie Williams, and Jason A. Osborne. 2011. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities. IEEE Transactions on Software Engineering 37, 6 (Nov. 2011), 772--787.
[16]
Georgios Spanos, Lefteris Angelis, and Dimitrios Toloudis. 2017. Assessment of Vulnerability Severity using Text Mining. ACM, 49.

Cited By

View all
  • (2024)Enhancing Green Bean Anthracnose Severity Detection via Integrated CNN-LSTM Models2023 4th International Conference on Intelligent Technologies (CONIT)10.1109/CONIT61985.2024.10626282(1-4)Online publication date: 21-Jun-2024
  • (2024)CVE Severity Prediction From Vulnerability Description - A Deep Learning ApproachProcedia Computer Science10.1016/j.procs.2024.04.294235(3105-3117)Online publication date: 2024
  • (2024)Text mining based an automatic model for software vulnerability severity predictionInternational Journal of System Assurance Engineering and Management10.1007/s13198-024-02371-215:8(3706-3724)Online publication date: 31-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EASE '19: Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering
April 2019
345 pages
ISBN:9781450371452
DOI:10.1145/3319008
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • IT University of Copenhagen

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. multi-class classification
  2. regression
  3. vulnerability severity prediction
  4. word embeddings

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

EASE '19

Acceptance Rates

EASE '19 Paper Acceptance Rate 20 of 73 submissions, 27%;
Overall Acceptance Rate 71 of 232 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)3
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Green Bean Anthracnose Severity Detection via Integrated CNN-LSTM Models2023 4th International Conference on Intelligent Technologies (CONIT)10.1109/CONIT61985.2024.10626282(1-4)Online publication date: 21-Jun-2024
  • (2024)CVE Severity Prediction From Vulnerability Description - A Deep Learning ApproachProcedia Computer Science10.1016/j.procs.2024.04.294235(3105-3117)Online publication date: 2024
  • (2024)Text mining based an automatic model for software vulnerability severity predictionInternational Journal of System Assurance Engineering and Management10.1007/s13198-024-02371-215:8(3706-3724)Online publication date: 31-May-2024
  • (2024)An empirical study on the potential of word embedding techniques in bug report management tasksEmpirical Software Engineering10.1007/s10664-024-10510-329:5Online publication date: 25-Jul-2024
  • (2024)An extensive study of the effects of different deep learning models on code vulnerability detection in Python codeAutomated Software Engineering10.1007/s10515-024-00413-431:1Online publication date: 31-Jan-2024
  • (2023)Impact of Word Embedding Methods on Software Vulnerability Severity Prediction Models2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/Confluence56041.2023.10048868(293-297)Online publication date: 19-Jan-2023
  • (2023)A Systematic Literature Review on Software Vulnerability Prediction ModelsIEEE Access10.1109/ACCESS.2023.331261311(110289-110311)Online publication date: 2023
  • (2023)Automatic software vulnerability assessment by extracting vulnerability elementsJournal of Systems and Software10.1016/j.jss.2023.111790204:COnline publication date: 1-Oct-2023
  • (2023)Service-oriented model-based fault prediction and localization for service compositions testing using deep learning techniquesApplied Soft Computing10.1016/j.asoc.2023.110430143:COnline publication date: 1-Aug-2023
  • (2022)Learning Algorithm Recommendation Framework for IS and CPS SecurityInternational Journal of Systems and Software Security and Protection10.4018/IJSSSP.29323613:1(1-23)Online publication date: 11-Mar-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media