2019 5th International Conference on Big Data and Information Analytics (BigDIA) 2019
DOI: 10.1109/bigdia.2019.8802851
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Severity Prediction With Deep Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…CNNs are capable of capturing local dependencies and structural features within sentences or documents. Our research indicates their suitability for highly structured sequential data tasks like vulnerability prediction, and some studies have already achieved certain results [8]. We have defined a one-dimensional CNN layer with 256 filters and a kernel size of 3x3 after the lightweight Transformer block to capture local patterns from the Transformer layer's output, enhancing the model's ability to recognize structural patterns in source code, such as indentation patterns and bracket matching.…”
Section: Cnnmentioning
confidence: 99%
See 1 more Smart Citation
“…CNNs are capable of capturing local dependencies and structural features within sentences or documents. Our research indicates their suitability for highly structured sequential data tasks like vulnerability prediction, and some studies have already achieved certain results [8]. We have defined a one-dimensional CNN layer with 256 filters and a kernel size of 3x3 after the lightweight Transformer block to capture local patterns from the Transformer layer's output, enhancing the model's ability to recognize structural patterns in source code, such as indentation patterns and bracket matching.…”
Section: Cnnmentioning
confidence: 99%
“…In recent years, research on vulnerability prediction technology has made significant progress. Researchers use various machine learning algorithms to try to predict potential vulnerabilities from a large number of software attributes, such as using Decision Tree [6], SVM [7], and traditional machine learning techniques such as neural networks [8]. However, existing methods often face difficulties in identifying minority category vulnerabilities when dealing with highly unbalanced real-world vulnerability datasets, and traditional deep learning and machine learning methods cannot fully learn vulnerability features [9].…”
Section: Introductionmentioning
confidence: 99%
“…Te model-based approach, on the other hand, hopes to take advantage of machine learning algorithms to automatically extract features through algorithms to avoid the bias brought about by manual extraction of features, and the main idea is to characterize and classify vulnerability description statements based on machine learning methods. Khazaei et al [25], Wang et al [28], Han et al [29], and Liu et al [30] have characterized vulnerability descriptions using traditional wordvector algorithms. However, such methods do not consider contextual information, which may contain rich information that could enhance the fnal prediction.…”
Section: Related Workmentioning
confidence: 99%
“…LGBM [90] and Random forest) outperformed single models (e.g., Naïve Bayes, KNN and SVM) for this task. Predicting severity levels has also been tackled with DL techniques [114,166] such as Recurrent Convolutional Neural Network (RCNN) [103], Convolutional Neural Network (CNN) [94], Long-Short Term Memory (LSTM) [75]. These studies showed potential performance gain of DL models compared to traditional ML counterparts.…”
Section: Severity Levelsmentioning
confidence: 99%