DCW-RNN: Improving Class Level Metrics for Software Vulnerability Detection Using Artificial Immune System with Clock-Work Recurrent Neural Network

As the defenses evolve, so do the solutions to a software vulnerability. The primary reason for security incidents, e.g., cyber-attacks, originates from software vulnerabilities. It is challenging to enhance the performance of software processes and determine and eliminate software vulnerabilities....

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) s. 1 - 8
Hlavný autor: Sahin, Canan Batur
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 25.08.2021
Predmet:
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract As the defenses evolve, so do the solutions to a software vulnerability. The primary reason for security incidents, e.g., cyber-attacks, originates from software vulnerabilities. It is challenging to enhance the performance of software processes and determine and eliminate software vulnerabilities. Thus, the development of algorithms with higher security to be applied to possible security issues in software represents a significant research subject for researchers in the domain of software security. The basis of the Dendritic Cell Algorithm (DCA), which is an emerging evolutionary algorithm, constitutes the behavior of specific immune agents, called dendritic cells (DCs). Till now, no strategy or idea has already been adopted on the Clock-Work Recurrent Neural Network (RNN) based Dendritic cell algorithm on vulnerability detection problems. In the present research, the first Clock-Work RNN based Dendritic Cell Algorithm (DCA) was suggested to identify complex dependencies between vulnerable object-oriented software metrics. The suggested method establishes immunity in software vulnerability prediction models to analyze the comparison of the Artificial Immune System Algorithms. The current paper involves the enhanced Clock-Work RNN based Dendritic Cell Algorithm, Genetic Algorithm (GA), and Clonal Selection Algorithm (CLONALG). Furthermore, comparison some studies was made on the basis Artificial Immune System (AIS) algorithms, such as Negative Selection Algorithm (NSA), Cellular Automata (CA), Membrane Computing (P-Systems). The experimental findings of our study demonstrate that our approach was computationally efficient on three different Java projects: Apache Tomcat (releases 6 and 7), Apache CXF, and the Stanford SecuriBench datasets.
AbstractList As the defenses evolve, so do the solutions to a software vulnerability. The primary reason for security incidents, e.g., cyber-attacks, originates from software vulnerabilities. It is challenging to enhance the performance of software processes and determine and eliminate software vulnerabilities. Thus, the development of algorithms with higher security to be applied to possible security issues in software represents a significant research subject for researchers in the domain of software security. The basis of the Dendritic Cell Algorithm (DCA), which is an emerging evolutionary algorithm, constitutes the behavior of specific immune agents, called dendritic cells (DCs). Till now, no strategy or idea has already been adopted on the Clock-Work Recurrent Neural Network (RNN) based Dendritic cell algorithm on vulnerability detection problems. In the present research, the first Clock-Work RNN based Dendritic Cell Algorithm (DCA) was suggested to identify complex dependencies between vulnerable object-oriented software metrics. The suggested method establishes immunity in software vulnerability prediction models to analyze the comparison of the Artificial Immune System Algorithms. The current paper involves the enhanced Clock-Work RNN based Dendritic Cell Algorithm, Genetic Algorithm (GA), and Clonal Selection Algorithm (CLONALG). Furthermore, comparison some studies was made on the basis Artificial Immune System (AIS) algorithms, such as Negative Selection Algorithm (NSA), Cellular Automata (CA), Membrane Computing (P-Systems). The experimental findings of our study demonstrate that our approach was computationally efficient on three different Java projects: Apache Tomcat (releases 6 and 7), Apache CXF, and the Stanford SecuriBench datasets.
Author Sahin, Canan Batur
Author_xml – sequence: 1
  givenname: Canan Batur
  surname: Sahin
  fullname: Sahin, Canan Batur
  email: canan.batur@ozal.edu.tr
  organization: Malatya Turgut Ozal University,Faculty of Engineering and Natural Sciences,Malatya,Turkey
BookMark eNotkEtOwzAYhI0ECyg9ARtfICV-NmFXpTwilSD1QZeVk_wGq4ldOU6rnoMLE0RXo9HMfIu5Q9fWWUAIk3hCSJw-5kW-Ws8EpZJOaEzJJBU8kXF6hcbpNCFSCs5kzJJb9DPPttGyKJ5w3h68Oxr7hbNGdR1ewBEa_A7Bm6rD2nm8cjqclAf82TcWvCpNY8IZzyFAFYyzeNP9zWc-GG0qo5qB2fYW8OrcBWjxyYTvAe6qfbR1fo-XUPXegw24gN4P9QLCaQju0Y1WTQfji47Q5uV5nb1Fi4_XPJstIkNIEiLJp4onvBSa15RzmtZ1AoyXVQ0Ag6FTSTWXtRYSWClqwUuiGCslJTrmULERevjnmmGwO3jTKn_eXa5iv8g_ZxI
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/INISTA52262.2021.9548609
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665436038
1665436034
EndPage 8
ExternalDocumentID 9548609
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-647a484b5f4d24429dd8e34bcdeee9dd2762f46df56e3b5d54b1a33b621f04ec3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:38 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-647a484b5f4d24429dd8e34bcdeee9dd2762f46df56e3b5d54b1a33b621f04ec3
PageCount 8
ParticipantIDs ieee_primary_9548609
PublicationCentury 2000
PublicationDate 2021-Aug.-25
PublicationDateYYYYMMDD 2021-08-25
PublicationDate_xml – month: 08
  year: 2021
  text: 2021-Aug.-25
  day: 25
PublicationDecade 2020
PublicationTitle 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
PublicationTitleAbbrev INISTA
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7679381
Snippet As the defenses evolve, so do the solutions to a software vulnerability. The primary reason for security incidents, e.g., cyber-attacks, originates from...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms clock-work
dendritic cell
Measurement
object-oriented metrics
optimization
Prediction algorithms
recurrent neural network
Recurrent neural networks
Software
Software algorithms
Software metrics
software vulnerability
Technological innovation
Title DCW-RNN: Improving Class Level Metrics for Software Vulnerability Detection Using Artificial Immune System with Clock-Work Recurrent Neural Network
URI https://ieeexplore.ieee.org/document/9548609
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF1q8eBJxYrf7MGj2-Zjs0m8ldZiQUNpq_ZWNrsTKGgqaaL4O_zD7mxqRfDiLQnLhswuM5O3b94QcqlMTJMy5AzCTDKuhMOkiassiEFLk7Fj7YBtNhEmSTSbxaMGudrUwgCAJZ9BGy_tWb5eqgqhsg6Kkwms1tsKQ1HXan2Tc5y4M0yGk2kX8wkssPLc9nr4r74pNmwMdv_3wj3S-qm_o6NNZNknDcgPyGe_98TGSXJNN0AAtS0t6R0Sf-g99sZSK2qyUDoxzvVdFkAfq2eUlbYM2A_ah9Iyr3JqmQK0W1imkNmCZs6XKgdaC5hTRGfN5MZXMkTT6RhRedRxoijmYYYnNXu8RR4GN9PeLVu3VGAL8ydRMsFDySOeBhnXJrB7sdYR-DxV2ny7ufGMb8y40FkgwE8DHfDUlb6fCs_NHA7KPyTNfJnDEaGZk8YqU8LYQnFXihRP3CJIecZBB8o9Jgdo0PlrrZoxX9vy5O_Hp2QH1wzRWi84I82yqOCcbKu3crEqLuxSfwG9fq_q
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEN0QNdGTGjB-uwePLvRj21JvBCQQoSGAyo1sd6cJiRZTWo2_wz_szhYxJl68tU27zc42M9PZ994Qci11TBMi4AyCRDAufYsJHVeZF4ISOmNH7oBpNhFEUXM2C0cVcrPhwgCAAZ9BHQ_NXr5aygJLZQ0UJ_ORrbeNnbO8kq31Dc-xwkY_6k-mLcwokGLl2PX1A786p5jA0d3_3ysPSO2HgUdHm9hySCqQVslnp_3ExlF0SzelAGqaWtIBQn_oELtjyRXVeSidaPf6LjKgj8UzCksbDOwH7UBusFcpNVgB2soMVkh_hHrMlyIFWkqYU6zP6sG1t2RYT6djrMujkhNFOQ99e1Tix2vkoXs3bffYuqkCW-h_iZz5PBC8yWMv4UqHdidUqgkuj6XSc9cnjvaOCfdV4vngxp7yeGwL1419x04sDtI9IlvpMoVjQhMrDmUifW0LyW3hx7jn1oSYJxyUJ-0TUkWDzl9L3Yz52panf1--Iru96XAwH_Sj-zOyh-uHtVvHOydbeVbABdmRb_lilV2aZf8CEPKzNQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+International+Conference+on+INnovations+in+Intelligent+SysTems+and+Applications+%28INISTA%29&rft.atitle=DCW-RNN%3A+Improving+Class+Level+Metrics+for+Software+Vulnerability+Detection+Using+Artificial+Immune+System+with+Clock-Work+Recurrent+Neural+Network&rft.au=Sahin%2C+Canan+Batur&rft.date=2021-08-25&rft.pub=IEEE&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FINISTA52262.2021.9548609&rft.externalDocID=9548609