Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

Author:

Arıkan Süleyman Muhammed,Koçak Aynur,Alkan Mustafa

Abstract

AbstractSoftware can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires significant effort, experience, and many manual steps. The objective of this study is to automate the process of producing cyber threat intelligence, focusing on closed source software vulnerabilities. To achieve our goal, we have developed a system called cti-for-css. Deep learning algorithms were used for detection. To simplify data representation and reduce pre-processing workload, the study proposes the function-as-sentence approach. The MLP, OneDNN, LSTM, and Bi-LSTM algorithms were trained using this approach with the SOSP and NDSS18 binary datasets, and their results were compared. The aforementioned datasets contain buffer error vulnerabilities (CWE-119) and resource management error vulnerabilities (CWE-399). Our results are as successful as the studies in the literature. The system achieved the best performance using Bi-LSTM, with F1 score of 82.4%. Additionally, AUC score of 93.0% was acquired, which is the best in the literature. The study concluded by producing cyber threat intelligence using closed source software. Shareable intelligence was produced in an average of 0.1 s, excluding the detection process. Each record, which was represented using our approach, was classified in under 0.32 s on average.

Funder

Gazi University

Publisher

Springer Science and Business Media LLC

Reference109 articles.

1. TÜBITAK BILGEM, Secure Software Development Guide. Tech. Rep., TÜBITAK (2018). https://siberakademi.bilgem.tubitak.gov.tr/pluginfile.php/6115/mod_page/content/26/SGE-KLV-GuvenliYazilimGelistirmeKilavuzu_R1.1.pdf

2. Huang, Z., Tan, G., Yu, X.: Mitigating vulnerabilities in closed source software. ICST Trans. Secur. Saf. 8, e4 (2022). https://doi.org/10.4108/eetss.v8i30.253

3. heartbleed.com. Heartbleed Bug. https://heartbleed.com/

4. Ahrens, J.: Buffer overflow exploitation: a real world example. https://www.rcesecurity.com/2011/11/buffer-overflow-a-real-world-example/

5. Brumley, D., Jager, I., Avgerinos, T., Schwartz, E.J.: BAP: a binary analysis platform. In: Gopalakrishnan, G., Qadeer S. (eds.) Computer Aided Verification. Springer, Berlin, pp. 463–469 (2011). https://doi.org/10.1007/978-3-642-22110-1_37

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3