Vulnerability Prediction Based on Weighted Software Network for Secure Software Building

02/13/2019
by   Shengjun Wei, et al.
0

To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the software system before software security testing. At present many software security metrics have been proposed to design a VPM. In this paper, we predict vulnerable classes in a software system by establishing the system's weighted software network. The metrics are obtained from the nodes' attributes in the weighted software network. We design and implement a crawler tool to collect all public security vulnerabilities in Mozilla Firefox. Based on these data, the prediction model is trained and tested. The results show that the VPM based on weighted software network has a good performance in accuracy, precision, and recall. Compared to other studies, it shows that the performance of prediction has been improved greatly in Pr and Re.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/29/2020

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities

Context: Security is vital to software developed for commercial or perso...
research
12/21/2020

Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach

Vulnerability prediction refers to the problem of identifying the system...
research
05/16/2021

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Due to the growing number of cyber attacks against computer systems, we ...
research
11/19/2021

Quantifying Cybersecurity Effectiveness of Software Diversity

The deployment of monoculture software stacks can cause a devastating da...
research
11/21/2020

A Secure Deep Probabilistic Dynamic Thermal Line Rating Prediction

Accurate short-term prediction of overhead line (OHL) transmission ampac...
research
03/09/2022

Noisy Label Learning for Security Defects

Data-driven software engineering processes, such as vulnerability predic...
research
07/02/2019

Build It, Break It, Fix It: Contesting Secure Development

Typical security contests focus on breaking or mitigating the impact of ...

Please sign up or login with your details

Forgot password? Click here to reset