2014 International Conference on Reliability Optimization and Information Technology (ICROIT) 2014
DOI: 10.1109/icroit.2014.6798341
|View full text |Cite
|
Sign up to set email alerts
|

A bug Mining tool to identify and analyze security bugs using Naive Bayes and TF-IDF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 54 publications
(30 citation statements)
references
References 8 publications
0
30
0
Order By: Relevance
“…Wijayasekara et al [53] show the hidden impact vulnerabilities that were first identified as non-security bugs and publicized and later were identified as vulnerabilities due to exploits. In addition, previous work [5,15,23,50,54,65] has used supervised and unsupervised learning techniques to classify the vulnerabilities and general bugs based on the textual information of the patches. Tyo [50] showed that the Naive Bayes and Support Vector Machine classifiers always have the best performance.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wijayasekara et al [53] show the hidden impact vulnerabilities that were first identified as non-security bugs and publicized and later were identified as vulnerabilities due to exploits. In addition, previous work [5,15,23,50,54,65] has used supervised and unsupervised learning techniques to classify the vulnerabilities and general bugs based on the textual information of the patches. Tyo [50] showed that the Naive Bayes and Support Vector Machine classifiers always have the best performance.…”
Section: Related Workmentioning
confidence: 99%
“…Given the significance of security bugs, many recent papers [5,19,23,50,53,54,65] have attempted to distinguish security bugs from general bugs automatically. Most of these works focus on analyzing textual information, such as a bug description, and their classification of security impacts is mainly based on text-mining techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Section 5 is about recommendation experiment using tensor factorization and tensor dimensions are further reduced as per the assigned weight using Latent Dirichlet Allocation algorithm. Section 6 is associated with results which show reduction in less relevant recommendations and accuracy improvement with the help of recall and precision [27] and finally, Sect. 7 concludes the paper and mentions future scope.…”
Section: Introductionmentioning
confidence: 99%
“…The text mining method used was a basic "bag of words" approach where the frequency of Behl et al published a paper which highly relates to our work [4], however this paper does not seem to be credible. They claim to have used "the bugzilla repository of bug reports," however bugzilla is an issue tracking system software suite and has no repository of bug reports.…”
Section: Automated Bug Report Classificationmentioning
confidence: 90%
“…Supervised machine learning algorithms were used to classify each bug report as security related or not (two-class problem), based only on the information found in a bug tracking system. Several efforts have been done [4], [5], [6], and [7], which focused on separating security from non-security bug reports: [4], [5], and [6] automated this process achieving moderate performance. Furthermore, all approaches were only focused on classification to security and non-security bug reports.…”
Section: Research Questions and Contributionsmentioning
confidence: 99%