Skip to main content
Erschienen in: The Journal of Supercomputing 15/2023

05.05.2023

A novel approach for software vulnerability detection based on intelligent cognitive computing

verfasst von: Cho Do Xuan, Dao Hoang Mai, Ma Cong Thanh, Bui Van Cong

Erschienen in: The Journal of Supercomputing | Ausgabe 15/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advanced computational algorithms. It's a combination of four main processing techniques including (i) Source Embedding, (ii) Feature Learning, (iii) Resampling Data, and (iv) Classification. The Source Embedding method will perform the task of analyzing and standardizing the source code based on the Joern tool and the data mining algorithm. The Feature Learning model has the function of aggregating and extracting source code attribute based on node using machine learning and deep learning methods. The Resampling Data technique will perform equalization of the experimental dataset. Finally, the Classification model has the function of detecting source code vulnerabilities. The novelty and uniqueness of the new intelligent cognitive computing method is the combination and synchronous use of many different data extracting techniques to compute, represent, and extract the properties of the source code. With this new calculation method, many significant unusual properties and features of the vulnerability have been synthesized and extracted. To prove the superiority of the proposed method, we experiment to detect source code vulnerabilities based on the Verum dataset, details of this part are presented in the experimental section. The experimental results show that the method proposed in the paper has brought good results on all measures. These results have shown to be the best research results for the source code vulnerability detection task using the Verum dataset according to our survey to date. With such results, the proposal in this study is not only meaningful in terms of science but also in practical terms when the method of using intelligent cognitive computing techniques to analyze and evaluate source code has helped to improve the efficiency of the source code analysis and vulnerability detection process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat H. Wei, M. Li, (2017) Supervised Deep Features For Software Functional Clone Detection By Exploiting Lexical And Syntactical Information In Source Code, In: Proceedings of the TwentySixth International Joint Conference on Artificial Intelligence, pp 3034–3040, Melbourne, Australia H. Wei, M. Li, (2017) Supervised Deep Features For Software Functional Clone Detection By Exploiting Lexical And Syntactical Information In Source Code, In: Proceedings of the TwentySixth International Joint Conference on Artificial Intelligence, pp 3034–3040, Melbourne, Australia
15.
Zurück zum Zitat Hu J, Chen J, Zhang L, Liu Y, Bao Q, Ackah-Arthur H, Zhang C (2020) A memory-related vulnerability detection approach based on vulnerability features. Tsinghua Sci Technol 25(5):604–613CrossRef Hu J, Chen J, Zhang L, Liu Y, Bao Q, Ackah-Arthur H, Zhang C (2020) A memory-related vulnerability detection approach based on vulnerability features. Tsinghua Sci Technol 25(5):604–613CrossRef
17.
Zurück zum Zitat Li, D. Zou, S. Xu et al., (2018) VulDeePecker: a deep learning based system for vulnerability detection Li, D. Zou, S. Xu et al., (2018) VulDeePecker: a deep learning based system for vulnerability detection
23.
Zurück zum Zitat Yamaguchi F, Lottmann M, Rieck K (2012) Generalized vulnerability extrapolation using abstract syntax trees. Annual Comput Secur Appl Conf 28:358–368 Yamaguchi F, Lottmann M, Rieck K (2012) Generalized vulnerability extrapolation using abstract syntax trees. Annual Comput Secur Appl Conf 28:358–368
24.
Zurück zum Zitat Hugo Gascon,Fabian Yamaguchi,Daniel Arp, Konrad Rieck, "Structural detection of android malware using embedded call graphs," ACM workshop on Artificial intelligence and security, pp. 45–54, 2013. Hugo Gascon,Fabian Yamaguchi,Daniel Arp, Konrad Rieck, "Structural detection of android malware using embedded call graphs," ACM workshop on Artificial intelligence and security, pp. 45–54, 2013.
25.
Zurück zum Zitat Jeanne FJ, Warren OD (1989) The program dependence graph and its use in optimization. ACM Trans Programming Languages Syst 9(3):319–349MATH Jeanne FJ, Warren OD (1989) The program dependence graph and its use in optimization. ACM Trans Programming Languages Syst 9(3):319–349MATH
26.
Zurück zum Zitat Fabian Yamaguchi; Nico Golde; Daniel Arp; Konrad Rieck, (2014) "Modeling and Discovering Vulnerabilities with Code Property Graphs," IEEE Symposium on Security and Privacy Fabian Yamaguchi; Nico Golde; Daniel Arp; Konrad Rieck, (2014) "Modeling and Discovering Vulnerabilities with Code Property Graphs," IEEE Symposium on Security and Privacy
27.
Zurück zum Zitat Wang, S.; Liu, T.; Tan, L. (2016) Automatically learning semantic features for defect prediction. In: Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), Austin, TX, USA, pp 14–22 Wang, S.; Liu, T.; Tan, L. (2016) Automatically learning semantic features for defect prediction. In: Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), Austin, TX, USA, pp 14–22
28.
Zurück zum Zitat Lin, G.; Zhang, J.; Luo, W.; Pan, L.; Xiang, Y. (2017) POSTER: Vulnerability Discovery With Function Representation Learning From Unlabeled Projects. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November Lin, G.; Zhang, J.; Luo, W.; Pan, L.; Xiang, Y. (2017) POSTER: Vulnerability Discovery With Function Representation Learning From Unlabeled Projects. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November
29.
Zurück zum Zitat Lin G, Zhang J, Luo W, Pan L, Xiang Y, De Vel O, Montague P (2018) Cross-project transfer representation learning for vulnerable function discovery. IEEE Trans Ind Inform 14:3289–3297CrossRef Lin G, Zhang J, Luo W, Pan L, Xiang Y, De Vel O, Montague P (2018) Cross-project transfer representation learning for vulnerable function discovery. IEEE Trans Ind Inform 14:3289–3297CrossRef
30.
Zurück zum Zitat Pradel, M.; Sen, K. (2018) DeepBugs: A Learning Approach to Name-Based Bug Detection. In: Proceedings of the ACM on Programming Languages(OOPSLA), Boston, MA, USA, pp 7–9 Pradel, M.; Sen, K. (2018) DeepBugs: A Learning Approach to Name-Based Bug Detection. In: Proceedings of the ACM on Programming Languages(OOPSLA), Boston, MA, USA, pp 7–9
31.
Zurück zum Zitat Bian P, Liang B, Zhang Y, Yang C, Shi W, Cai Y (2018) Detecting bugs by discovering expectations and their violations. IEEE Trans Softw Eng 45:984–1001CrossRef Bian P, Liang B, Zhang Y, Yang C, Shi W, Cai Y (2018) Detecting bugs by discovering expectations and their violations. IEEE Trans Softw Eng 45:984–1001CrossRef
32.
Zurück zum Zitat F. Yamaguchi, A. Maier, H. Gascon, and K. Rieck, (2015) “Automatic inference of search patterns for taint-style vulnerabilities,” In: Proceedings of 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp 797–812. F. Yamaguchi, A. Maier, H. Gascon, and K. Rieck, (2015) “Automatic inference of search patterns for taint-style vulnerabilities,” In: Proceedings of 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp 797–812.
34.
Zurück zum Zitat X. Xu, C. Liu, Q. Feng, H. Yin, L. Song, and D. Song, (2017) ‘‘Neural Network Based Graph Embedding For Cross-Platform Binary Code Similarity Detection,’’ In: Proc. ACM SIGSAC Conf. Comput. Commun. Secur., pp 363–376. X. Xu, C. Liu, Q. Feng, H. Yin, L. Song, and D. Song, (2017) ‘‘Neural Network Based Graph Embedding For Cross-Platform Binary Code Similarity Detection,’’ In: Proc. ACM SIGSAC Conf. Comput. Commun. Secur., pp 363–376.
35.
Zurück zum Zitat Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo , "Automated software vulnerability detection with machine learning," arXiv, 2018. 55. Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo , "Automated software vulnerability detection with machine learning," arXiv, 2018. 55.
37.
Zurück zum Zitat Ben-Nun, T.; Jakobovits, A.S.; Hoefler, T. Neural Code Comprehension: A Learnable Representation of Code Semantics. In: Proceedings of the Advances in Neural Information Processing Systems, Montréal, QC, Canada, pp 3–8 December 2018 Ben-Nun, T.; Jakobovits, A.S.; Hoefler, T. Neural Code Comprehension: A Learnable Representation of Code Semantics. In: Proceedings of the Advances in Neural Information Processing Systems, Montréal, QC, Canada, pp 3–8 December 2018
38.
Zurück zum Zitat Yi Li, Shaohua Wang, and Tien N. Nguyen. 2021. Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, pp 292–303. https://doi.org/10.1145/3468264.3468597. Yi Li, Shaohua Wang, and Tien N. Nguyen. 2021. Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, pp 292–303. https://​doi.​org/​10.​1145/​3468264.​3468597.
49.
Zurück zum Zitat Svozil D, Kvasnicka V, Pospíchal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62CrossRef Svozil D, Kvasnicka V, Pospíchal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62CrossRef
50.
51.
52.
Zurück zum Zitat Z Li, W Yang, S Peng, F Liu. A survey of convolutional neural networks: analysis, applications, and prospects. arXiv: 2004.02806. Z Li, W Yang, S Peng, F Liu. A survey of convolutional neural networks: analysis, applications, and prospects. arXiv: 2004.02806.
55.
Zurück zum Zitat Ming Chen, Zhewei Wei, Zengfeng Huang, Bolin Ding, Yaliang Li (2021) Simple and Deep Graph Convolutional Networks. arXiv, arXiv:2007.02133v1. Ming Chen, Zhewei Wei, Zengfeng Huang, Bolin Ding, Yaliang Li (2021) Simple and Deep Graph Convolutional Networks. arXiv, arXiv:​2007.​02133v1.
56.
Zurück zum Zitat Kishan KC, Rui Li, Feng Cui, Anne Haake (2020) Predicting Biomedical Interactions with Higher-Order Graph Convolutional Networks. arXiv, arXiv:2010.08516. Kishan KC, Rui Li, Feng Cui, Anne Haake (2020) Predicting Biomedical Interactions with Higher-Order Graph Convolutional Networks. arXiv, arXiv:​2010.​08516.
57.
Zurück zum Zitat Muhammet Balcilar, Guillaume Renton et al (2020) Bridging the Gap Between Spectral and Spatial Domains in Graph Neural Networks. arXiv, arXiv:2003.11702. Muhammet Balcilar, Guillaume Renton et al (2020) Bridging the Gap Between Spectral and Spatial Domains in Graph Neural Networks. arXiv, arXiv:​2003.​11702.
58.
Zurück zum Zitat Julian Busch, Anton Kocheturov, Volker Tresp, Thomas Seidl (2021) NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification. arXiv, arXiv:2103.03939. Julian Busch, Anton Kocheturov, Volker Tresp, Thomas Seidl (2021) NF-GNN: Network Flow Graph Neural Networks for Malware Detection and Classification. arXiv, arXiv:​2103.​03939.
60.
Zurück zum Zitat Michael SchlichtkrullThomas N. Kipf, "Modeling Relational Data with Graph Convolutional Networks," Lecture Notes in Computer Science , vol. 10843, 2018. Michael SchlichtkrullThomas N. Kipf, "Modeling Relational Data with Graph Convolutional Networks," Lecture Notes in Computer Science , vol. 10843, 2018.
61.
Zurück zum Zitat Catal, C., Akbulut, A., Ekenoglu, E., Alemdaroglu, M. (2017). Development of a Software Vulnerability Prediction Web Service Based on Artificial Neural Networks . In: Kang, U., Lim, EP., Yu, J., Moon, YS. (eds) Trends and Applications in Knowledge Discovery and Data Mining. PAKDD 2017. Lecture Notes in Computer Science(), vol 10526. Springer, Cham. https://doi.org/10.1007/978-3-319-67274-8_6. Catal, C., Akbulut, A., Ekenoglu, E., Alemdaroglu, M. (2017). Development of a Software Vulnerability Prediction Web Service Based on Artificial Neural Networks . In: Kang, U., Lim, EP., Yu, J., Moon, YS. (eds) Trends and Applications in Knowledge Discovery and Data Mining. PAKDD 2017. Lecture Notes in Computer Science(), vol 10526. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-67274-8_​6.
62.
Zurück zum Zitat Ramchoun H, Idrissi MAJ, Ghanou Y, Ettaouil M (2016) Multilayer perceptron: architecture optimization and training. Int J Interact Multimed Artif Intell 4(1):26–29 Ramchoun H, Idrissi MAJ, Ghanou Y, Ettaouil M (2016) Multilayer perceptron: architecture optimization and training. Int J Interact Multimed Artif Intell 4(1):26–29
63.
Zurück zum Zitat E. Hoffer and N. Ailon, (2015) Deep metric learning using triplet network,” In International Workshop on Similarity-Based Pattern Recognition. Springer, pp 84–92. E. Hoffer and N. Ailon, (2015) Deep metric learning using triplet network,” In International Workshop on Similarity-Based Pattern Recognition. Springer, pp 84–92.
65.
Zurück zum Zitat Nitesh VC, Kevin WB, Lawrence OH (2002) SMOTE : synthetic minority over-sampling technique. J Artif Intell Res 16(1):321–357 Nitesh VC, Kevin WB, Lawrence OH (2002) SMOTE : synthetic minority over-sampling technique. J Artif Intell Res 16(1):321–357
Metadaten
Titel
A novel approach for software vulnerability detection based on intelligent cognitive computing
verfasst von
Cho Do Xuan
Dao Hoang Mai
Ma Cong Thanh
Bui Van Cong
Publikationsdatum
05.05.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 15/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05282-4

Weitere Artikel der Ausgabe 15/2023

The Journal of Supercomputing 15/2023 Zur Ausgabe

Premium Partner