Automatic classification method for software vulnerability based on deep neural network

Guoyan Huang, Yazhou Li, Qian Wang*, Jiadong Ren, Yongqiang Cheng, Xiaolin Zhao

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

63 Citations (Scopus)

Abstract

Software vulnerabilities are the root causes of various security risks. Once a vulnerability is exploited by malicious attacks, it will greatly compromise the safety of the system, and may even cause catastrophic losses. Hence automatic classification methods are desirable to effectively manage the vulnerability in software, improve the security performance of the system, and reduce the risk of the system being attacked and damaged. In this paper, a new automatic vulnerability classification model (TFI-DNN) has been proposed. The model is built upon term frequency-inverse document frequency (TF-IDF), information gain (IG), and deep neural network (DNN): The TF-IDF is used to calculate the frequency and weight of each word from vulnerability description; the IG is used for feature selection to obtain an optimal set of feature word, and; the DNN neural network model is used to construct an automatic vulnerability classifier to achieve effective vulnerability classification. The National Vulnerability Database of the United States has been used to validate the effectiveness of the proposed model. Compared to SVM, Naive Bayes, and KNN, the TFI-DNN model has achieved better performance in multi-dimensional evaluation indexes including accuracy, recall rate, precision, and F1-score.

Original languageEnglish
Article number8654631
Pages (from-to)28291-28298
Number of pages8
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 2019

Keywords

  • Deep neural network
  • information gain
  • software security
  • vulnerability classification

Fingerprint

Dive into the research topics of 'Automatic classification method for software vulnerability based on deep neural network'. Together they form a unique fingerprint.

Cite this