Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions

Author:

Guo Hao1ORCID,Chen Sen1ORCID,Xing Zhenchang2,Li Xiaohong1,Bai Yude1,Sun Jiamou2

Affiliation:

1. College of Intelligence and Computing, Tianjin University, China

2. Research School of Computer Science, Australian National University, Australia

Abstract

Security vulnerabilities have been continually disclosed and documented. For the effective understanding, management, and mitigation of the fast-growing number of vulnerabilities, an important practice in documenting vulnerabilities is to describe the key vulnerability aspects, such as vulnerability type, root cause, affected product, impact, attacker type, and attack vector. In this article, we first investigate 133,639 vulnerability reports in the Common Vulnerabilities and Exposures (CVE) database over the past 20 years. We find that 56%, 85%, 38%, and 28% of CVEs miss vulnerability type, root cause, attack vector, and attacker type, respectively. By comparing the differences of the latest updated CVE reports across different databases, we observe that 1,476 missing key aspects in 1,320 CVE descriptions were augmented manually in the National Vulnerability Database (NVD) , which indicates that the vulnerability database maintainers try to complete the vulnerability descriptions in practice to mitigate such a problem. To help complete the missing information of key vulnerability aspects and reduce human efforts, we propose a neural-network-based approach called PMA to predict the missing key aspects of a vulnerability based on its known aspects. We systematically explore the design space of the neural network models and empirically identify the most effective model design in the scenario. Our ablation study reveals the prominent correlations among vulnerability aspects when predicting. Trained with historical CVEs, our model achieves 88%, 71%, 61%, and 81% in F1 for predicting the missing vulnerability type, root cause, attacker type, and attack vector of 8,623 “future” CVEs across 3 years, respectively. Furthermore, we validate the predicting performance of key aspect augmentation of CVEs based on the manually augmented CVE data collected from NVD, which confirms the practicality of our approach. We finally highlight that PMA has the ability to reduce human efforts by recommending and augmenting missing key aspects for vulnerability databases, and to facilitate other research works such as severity level prediction of CVEs based on the vulnerability descriptions.

Funder

The National Natural Science Foundation of China

Publisher

Association for Computing Machinery (ACM)

Subject

Software

Reference65 articles.

1. Martín Abadi Paul Barham Jianmin Chen Zhifeng Chen Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Geoffrey Irving Michael Isard Manjunath Kudlur Josh Levenberg Rajat Monga Sherry Moore Derek Murray Benoit Steiner Paul Tucker Vijay Vasudevan Pete Warden and Xiaoqiang Zhang. 2016. TensorFlow: A system for large-scale machine learning. In Proceedings of the 12th USENIX symposium on operating systems design and implementation (OSDI’16) . 265–283.

2. Semantic Modeling Approach for Software Vulnerabilities Data Sources

3. Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses;Anwar Afsah;arXiv preprint arXiv:2006.15074,2020

4. Formal Specification of the Framework for NSSA

5. H. Binyamini R. Bitton M. Inokuchi T. Yagyu Y. Elovici and A. Shabtai. 2020. An automated end-to-end framework for modeling attacks from vulnerability descriptions. arXiv preprint arXiv:2008.04377 .

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11

2. On NVD Users’ Attitudes, Experiences, Hopes and Hurdles;Digital Threats: Research and Practice;2024-08-21

3. Behind the Code: Identifying Zero-Day Exploits in WordPress;Future Internet;2024-07-19

4. Predicting software vulnerability based on software metrics: a deep learning approach;Iran Journal of Computer Science;2024-06-05

5. GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning;Journal of Systems and Software;2024-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3