An Empirical Study of High-Impact Factors for Machine Learning-Based Vulnerability Detection
Autor: | Xiaoxue Wu, Yuxing Xun, Jialiang Gao, Xiang Chen, Wei Zheng, Guoliang Liu |
---|---|
Rok vydání: | 2020 |
Předmět: |
Source code
Syntax (programming languages) Computer science business.industry media_common.quotation_subject Deep learning Feature extraction Vulnerability Machine learning computer.software_genre Random forest Statistical classification Image tracing Artificial intelligence business computer media_common |
Zdroj: | 2020 IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF). |
DOI: | 10.1109/ibf50092.2020.9034888 |
Popis: | Ahstract—Vulnerability detection is an important topic of software engineering. To improve the effectiveness and efficiency of vulnerability detection, many traditional machine learning-based and deep learning-based vulnerability detection methods have been proposed. However, the impact of different factors on vulnerability detection is unknown. For example, classification models and vectorization methods can directly affect the detection results and code replacement can affect the features of vulnerability detection. We conduct a comparative study to evaluate the impact of different classification algorithms, vectorization methods and user-defined variables and functions name replacement. In this paper, we collected three different vulnerability code datasets. These datasets correspond to different types of vulnerabilities and have different proportions of source code. Besides, we extract and analyze the features of vulnerability code datasets to explain some experimental results. Our findings from the experimental results can be summarized as follows: (i) the performance of using deep learning is better than using traditional machine learning and BLSTM can achieve the best performance. (ii) CountVectorizer can improve the performance of traditional machine learning. (iii) Different vulnerability types and different code sources will generate different features. We use the Random Forest algorithm to generate the features of vulnerability code datasets. These generated features include system-related functions, syntax keywords, and user-defined names. (iv) Datasets without user-defined variables and functions name replacement will achieve better vulnerability detection results. |
Databáze: | OpenAIRE |
Externí odkaz: |