Danielle Gonzalez, Holly Hastings, Mehdi Mirakhorli
{"title":"Automated Characterization of Software Vulnerabilities","authors":"Danielle Gonzalez, Holly Hastings, Mehdi Mirakhorli","doi":"10.1109/ICSME.2019.00023","DOIUrl":null,"url":null,"abstract":"Preventing vulnerability exploits is a critical software maintenance task, and software engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information about vulnerable systems and libraries. These reports include descriptions, disclosure sources, and manually-populated vulnerability characteristics such as root cause from the NIST Vulnerability Description Ontology (VDO). This information needs to be complete and accurate so stakeholders of affected products can prevent and react to exploits of the reported vulnerabilities. In this study, we demonstrate that VDO characteristics can be automatically detected from the textual descriptions included in CVE reports. We evaluated the performance of 6 classification algorithms with a dataset of 365 vulnerability descriptions, each mapped to 1 of 19 characteristics from the VDO. This work demonstrates that it is feasible to train classification techniques to accurately characterize vulnerabilities from their descriptions. All 6 classifiers evaluated produced accurate results, and the Support Vector Machine classifier was the best-performing individual classifier. Automating the vulnerability characterization process is a step towards ensuring stakeholders have the necessary data to effectively maintain their systems.","PeriodicalId":106748,"journal":{"name":"2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSME.2019.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Preventing vulnerability exploits is a critical software maintenance task, and software engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information about vulnerable systems and libraries. These reports include descriptions, disclosure sources, and manually-populated vulnerability characteristics such as root cause from the NIST Vulnerability Description Ontology (VDO). This information needs to be complete and accurate so stakeholders of affected products can prevent and react to exploits of the reported vulnerabilities. In this study, we demonstrate that VDO characteristics can be automatically detected from the textual descriptions included in CVE reports. We evaluated the performance of 6 classification algorithms with a dataset of 365 vulnerability descriptions, each mapped to 1 of 19 characteristics from the VDO. This work demonstrates that it is feasible to train classification techniques to accurately characterize vulnerabilities from their descriptions. All 6 classifiers evaluated produced accurate results, and the Support Vector Machine classifier was the best-performing individual classifier. Automating the vulnerability characterization process is a step towards ensuring stakeholders have the necessary data to effectively maintain their systems.
防止漏洞被利用是一项重要的软件维护任务,软件工程师经常依赖于公共漏洞和暴露(Common vulnerability and Exposure, cve)报告来获取有关易受攻击的系统和库的信息。这些报告包括描述、披露来源和手动填充的漏洞特征,例如来自NIST漏洞描述本体(VDO)的根本原因。此信息需要完整和准确,以便受影响产品的涉众可以预防并对报告的漏洞利用作出反应。在本研究中,我们证明了VDO特征可以从CVE报告中的文本描述中自动检测出来。我们使用365个漏洞描述的数据集评估了6种分类算法的性能,每个漏洞描述映射到来自VDO的19个特征中的1个。这项工作表明,训练分类技术从漏洞描述中准确地表征漏洞是可行的。所有6个分类器评估产生准确的结果,支持向量机分类器是表现最好的单个分类器。自动化漏洞表征过程是确保涉众拥有必要数据以有效维护其系统的一个步骤。