A multiclass hybrid approach to estimating software vulnerability vectors and severity score

Journal of Information Security and Applications - Tập 63 - Trang 103028 - 2021
Hakan Kekül1, Burhan Ergen2, Halil Arslan3
1Institute of Science, Fırat University, Elazığ, Turkey
2Computer Engineering Department, Fırat University, Elazığ, Turkey
3Computer Engineering Department, Sivas Cumhuriyet University, Sivas, Turkey

Tài liệu tham khảo

Ghaffarian, 2017, Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey, ACM Comput Surv, 50, 10.1145/3092566 Kobek, 2017, The State of Cybersecurity in Mexico: an Overview, Wilson Centre's Mex Institute, Jan Moore, 2017, Assessing ICT security risks in socio-technical systems (Dagstuhl seminar 16461), Dagstuhl Rep, 6, 63 Ruohonen, 2019, A look at the time delays in CVSS vulnerability scoring, Appl Comput Informat, 15, 129, 10.1016/j.aci.2017.12.002 Theisen, 2019, Better together: comparing vulnerability prediction models, Inf Softw Technol, 119, 2020 Wu, 2020, CVE-assisted large-scale security bug report dataset construction method, J Syst Softw, 160, 10.1016/j.jss.2019.110456 Raducu, 2020, Collecting vulnerable source code from open-source repositories for dataset generation, Appl Sci, 10, 10.3390/app10041270 Miyamoto, 2017, Text-mining approach for estimating vulnerability score, 67 Spanos, 2018, A multi-target approach to estimate software vulnerability characteristics and severity scores, J Syst Softw, 146, 152, 10.1016/j.jss.2018.09.039 Yang, 2020, Better not to use vulnerability's reference for exploitability prediction, Appl Sci, 10, 10.3390/app10072555 Patriciu, 2006, Security metrics for enterprise information systems, J Appl Quant Methods, 1, 151 National Vulnerability Database (2021), NVD URL https://nvd.nist.gov. János, 2018, Security Concerns Towards Security Operations Centers, 273 Kritikos, 2019, A survey on vulnerability assessment tools and databases for cloud-based web applications, Array, 3–4 Russo, 2019, Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities, J Syst Softw, 156, 84, 10.1016/j.jss.2019.06.001 Yasasin, 2020, Forecasting IT security vulnerabilities – An empirical analysis, Comput Secur, 88, 10.1016/j.cose.2019.101610 Sharma, 2021, Software vulnerability prioritization using vulnerability description, Int J Syst Assur Eng Manag, 12, 58, 10.1007/s13198-020-01021-7 Malhotra, 2021, Severity prediction of software vulnerabilities using textual data, 453 Aota, 2020, Automation of vulnerability classification from its description using machine learning, 1 M. Schiffman and C.I.A.G. Cisco, A Complete Guide to the Common Vulnerability Scoring System (CVSS) v1 Archive (2005), URL https://www.first.org/cvss/v1/guide. Spanos, 2013, WIVSS: a New Methodology for Scoring Information Systems Vulnerabilities, 83 Spanos, 2015, Impact metrics of security vulnerabilities: analysis and weighing, Inf Secur J A Glob Perspect, 24, 57, 10.1080/19393555.2015.1051675 Mell, 2007 Common Vulnerability Scoring System v3.0, User Guide (2021), URL https://www.first.org/cvss/v3.0/user-guide. Common Vulnerability Scoring System v3.1, User Guide (2021), URL https://www.first.org/cvss/v3.1/user-guide. Fesseha, 2021, Text classification based on convolutional neural networks and word embedding for low-resource languages: Tigrinya, Information, 12, 10.3390/info12020052 Uysal, 2014, The impact of preprocessing on text classification, Inf Process Manag, 50, 104, 10.1016/j.ipm.2013.08.006 Jalal, 2021, Text documents clustering using data mining techniques, Int J Electr Comput Eng, 11 Kowsari, 2019, Text classification algorithms: a survey, Information, 10, 150, 10.3390/info10040150 Zhang, 2010, Understanding bag-of-words model: a statistical framework, Int J Mach Learn Cybern, 1, 43, 10.1007/s13042-010-0001-0 Aizawa, 2003, An information-theoretic perspective of tf–idf measures, Inf Process Manag, 39, 45, 10.1016/S0306-4573(02)00021-3 Banerjee, 2003, The design, implementation, and use of the ngram statistics package, 370 Z. Yin and Y. Shen, “On the dimensionality of word embedding,” arXiv , Preprint arXiv 1812.04224, 2018. S. Aggarwal and D. Kaur, “Naïve Bayes Classifier with Various Smoothing Techniques for Text Documents,” 2013. Breiman, 1984 Fix, 1951 McCulloch, 1943, A logical calculus of the ideas immanent in nervous activity, Bull Math Biophys, 5, 115, 10.1007/BF02478259 Breiman, 2001, Random Forests, Mach Learn, 45, 5, 10.1023/A:1010933404324 Kohavi, 1995, A study of cross-validation and bootstrap for accuracy estimation and model selection, Ijcai, 14, 1137 Cawley, 2010, On over-fitting in model selection and subsequent selection bias in performance evaluation, J Mach Learn Res, 11, 2079 S. Russell and P. Norvig, Artificial intelligence: a modern approach (2002), URL https://storage.googleapis.com/pub-tools-public-publication-data/pdf/27702.pdf. Rennie, 2003, Tackling the poor assumptions of naive bayes text classifiers, 616 Mallory, 2018, Chemical reaction vector embeddings: towards predicting drug metabolism in the human gut microbiome, PSB, 56 Kamiński, 2018, A framework for sensitivity analysis of decision trees,” Cent, Eur J Oper Res, 26, 135, 10.1007/s10100-017-0479-6 Quinlan, 1987, Simplifying decision trees, Int J Man Mach Stud, 27, 221, 10.1016/S0020-7373(87)80053-6 Yang, 1999, An evaluation of statistical approaches to text categorization, Inf Retr Boston, 1, 69, 10.1023/A:1009982220290 Deng, 2019, Feature selection for text classification: a review, Multimed Tools Appl, 78, 3797, 10.1007/s11042-018-6083-5 Chen, 2020, The Lao text classification method based on KNN, Procedia Comput Sci, 166, 523, 10.1016/j.procs.2020.02.053 Tan, 2018, An improved KNN text classification algorithm based on K-medoids and rough set, 01, 109 Simanjuntak, 2010, Text classification techniques used to faciliate cyber terrorism investigation, 198 F. Rosenblatt, Principles of neurodynamics. perceptrons and the theory of brain mechanisms (1961), Cornell Aeronautical Lab Inc Buffalo NY, URL https://apps.dtic.mil/sti/citations/AD0256582. Rumelhart, 1985 Cybenko, 1992, Approximation by superpositions of a sigmoidal function, Math Control Signals Syst, 5, 455, 10.1007/BF02134016 Shah, 2020, A comparative analysis of logistic regression, random forest and KNN models for the text classification, Augment Hum Res, 5, 1, 10.1007/s41133-020-00032-0 Sun, 2020, Application research of text classification based on random forest algorithm, 370 Sawangarreerak, 2020, Random forest with sampling techniques for handling imbalanced prediction of university student depression, Information, 11, 10.3390/info11110519 Sokolova, 2009, A systematic analysis of performance measures for classification tasks, Inf Process Manag, 45, 427, 10.1016/j.ipm.2009.03.002 Bielza, 2011, Multi-dimensional classification with Bayesian networks, Int J Approx Reason, 52, 705, 10.1016/j.ijar.2011.01.007 Ballabio, 2018, Multivariate comparison of classification performance measures, Chemom Intell Lab Syst, 174, 33, 10.1016/j.chemolab.2017.12.004 Fang, 2020, Fastembed: predicting vulnerability exploitation possibility based on ensemble machine learning algorithm, PLoS ONE, 15, 1, 10.1371/journal.pone.0228439