AIセキュリティポータル K Program
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Share
Abstract
The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, finding vulnerable components and applying existing mitigation techniques is a viable practical approach for fighting against cyber-crime. In this paper, we investigate how the state-of-the-art machine learning techniques, including a popular deep learning algorithm, perform in predicting functions with possible security vulnerabilities in JavaScript programs. We applied 8 machine learning algorithms to build prediction models using a new dataset constructed for this research from the vulnerability information in public databases of the Node Security Project and the Snyk platform, and code fixing patches from GitHub. We used static source code metrics as predictors and an extensive grid-search algorithm to find the best performing models. We also examined the effect of various re-sampling strategies to handle the imbalanced nature of the dataset. The best performing algorithm was KNN, which created a model for the prediction of vulnerable functions with an F-measure of 0.76 (0.91 precision and 0.66 recall). Moreover, deep learning, tree and forest based classifiers, and SVM were competitive with F-measures over 0.70. Although the F-measures did not vary significantly with the re-sampling strategies, the distribution of precision and recall did change. No re-sampling seemed to produce models preferring high precision, while re-sampling strategies balanced the IR measures.
Software assurance curriculum project volume 1: Master of software assurance reference curriculum
N. R. Mead, J. H. Allen, M. Ardis, T. B. Hilburn, A. J. Kornecki, R. Linger, J. McDonald
Published: 2010
Can traditional fault prediction models be used for vulnerability prediction?
Y. Shin, L. A. Williams
Published: 2011
Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista
T. Zimmermann, N. Nagappan, L. Williams
Published: 2010
Enabling the Continuous Analysis of Security Vulnerabilities with VulData7
M. Jimenez, Y. Le Traon, M. Papadakis
Published: 2018
Predicting vulnerable software components
S. Neuhaus, T. Zimmermann, C. Holler, A. Zeller
Published: 2007
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
Y. Shin, A. Meneely, L. Williams, J. A. Osborne
Published: 2011
Challenges with applying vulnerability prediction models
P. Morrison, K. Herzig, B. Murphy, L. A. Williams
Published: 2015
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
I. Chowdhury, M. Zulkernine
Published: 2011
An empirical model to predict security vulnerabilities using code complexity metrics
Y. Shin, L. Williams
Published: 2008
VulinOSS: a dataset of security vulnerabilities in open-source systems
A. Gkortzis, D. Mitropoulos, D. Spinellis
Published: 2018
A preliminary study on the relationship among software metrics and specific vulnerability types
M. Siavvas, D. Kehagias, D. Tzovaras
Published: 2017
A metrics suite for object oriented design
S. R. Chidamber, C. F. Kemerer
Published: 1994
Grasping primitive enthusiasm - approaching primitive obsession in steps
E. Pengo, P. Gál
Published: 2018
Npm-miner: An infrastructure for measuring the quality of the npm registry
K. C. Chatzidimitriou, M. D. Papamichail, T. Diamantopoulos, M. Tsapanos, A. L. Symeonidis
Published: 2018
Benchmarking javascript frameworks
C. L. Mariano
Published: 2017
Tensorflow: a system for large-scale machine learning
M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard
Published: 2016
Algorithms for hyper-parameter optimization
J. S. Bergstra, R. Bardenet, Y. Bengio, B. Kegl
Published: 2011
A study of the behavior of several methods for balancing machine learning training data
G. E. A. P. A. Batista, R. C. Prati, M. C. Monard
Published: 2004
Share