Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism

It is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection.

Learning Optimized Patterns of Software Vulnerabilities with the Clock-Work Memory Mechanism

It is possible to better provide the security of the codebase and keep testing efforts at a minimum level by detecting vulnerable codes early in the course of software development. We assume that nature-inspired metaheuristic optimization algorithms can obtain “optimized patterns” from vulnerabilities created in an artificial manner. This study aims to use nature-inspired optimization algorithms combining heterogeneous data sources with the objective of learning optimized representations of vulnerable source codes. The chosen vulnerability-relevant data sources are cross-domain, involving historical vulnerability data from variable software projects and data from the Software Assurance Reference Database (SARD) comprising vulnerability examples. The main purpose of this paper is to outline the state-of-the-art and to analyze and discuss open challenges with regard to the most relevant areas in the field of bio-inspired optimization based on the representation of software vulnerability. Empirical research has demonstrated that the optimized representations produced by the suggested nature-inspired optimization algorithms are feasible and efficient and can be transferred for real-world vulnerability detection.

___

  • T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” arXiv preprint arXiv:1301.3781, 2013.
  • Shi, Y., Wang, Y., & Zheng, H. (2022). Wind Speed Prediction for Offshore Sites Using a Clockwork Recurrent Network. Energies, 15(3), 751.
  • J. Koutnik, K. Greff, F. Gomez, J.Schmidhuber. "A Clockwork RNN," Proceedings of the 31st International Conference on Machine Learning, 2014,PMLR 32(2):1863-1871.
  • Khurma, R.A., Aljarah, I., Sharieh, A.A., & Mirjalili, S.M. (2019). EvoloPy-FS: An Open-Source Nature-Inspired Optimization Framework in Python for Feature Selection. Algorithms for Intelligent Systems.
  • Ö. B. Dinler, C. B. Şahin, “Prediction of phishing web sites with deep learning using WEKA environment,” Avrupa Bilim ve Teknoloji Dergisi, vol. 24, pp. 35-41, 2021. doi:10.31590/ejosat.901465.
Avrupa Bilim ve Teknoloji Dergisi-Cover
  • Yayın Aralığı: 4
  • Başlangıç: 2013
  • Yayıncı: Osman Sağdıç
Sayıdaki Diğer Makaleler

Farklı Gölgelenen Kanallar Üzerinden Enerji-Verimli Veri İletimi için Geçmiş-temelli Su-Doldurma Algoritması

Omer Melih GUL

Güvenlik Kameralarında Otomatik Silah ve Bıçak Tespit Sistemi: Karşılaştırmalı YOLO Modelleri

Mehmet Tevfik AĞDAŞ, Sevinç GÜLSEÇEN

Beyin Bilgisayarlı Tomografi Görüntülerinde Yapay Zeka Tabanlı Beyin Damar Hastalıkları Tespiti

Ali Fatih KARATAŞ, Vakkas DOĞAN, Volkan KILIÇ

Bitlis İli Merkez İlçesindeki Ekmek Fırınlarının Hijyenik Durumu ve Yönetmeliğe Uygunluğu

Seda OĞUR, Mehmet Sabit GÜLTEKİN

Effect of Magnetohydrodynamic Second Order Slip Flow Boundary Condition Coefficients on Flow in Parallel Plates

Hatice ŞİMŞEK

Dalgacık Dönüşümü Esaslı Yöntem Kullanılarak İki ve Üç Boyutlu Paradigmaların Olay İlişkili Potansiyeller Üzerindeki Etkilerinin İncelenmesi

Onur Erdem KORKMAZ

Türkiye'ye yönelik dış turizm talebi açısından ülkelerin kümeleme analizi ile sınıflandırılması

Ece AYDOĞDU ULUKAN, Serhat PEKER

Mercimekte AG ve AC Tekrarları ile Zenginleştirilmiş Kütüphanelerin TG ve TC Tekrarları ile Taranarak Yeni SSR Markörlerin Geliştirilmesi

Şehriban DEMİR, Melike BAKIR

Endüstri 4.0’ın Uygulanmasında Kritik Başarı Faktörlerinin Belirlenmesi ve Aralık Tip-2 Bulanık TOPSIS Yöntemi ile Yatırım Teşviği Alan Firmaların Durum Değerlendirilmesi

Damla ÇEVİK AKA

Türkiye’de Çevresel Etki Değerlendirmesi Uygulamalarında İnşaat Sektörü Analizi

Hakan CEYLAN, Burçak YAVUZ