Skip to main content
Log in

Software vulnerability prioritization using vulnerability description

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Whenever a vulnerability is detected by the testing team, it is described based on its characteristics and a detailed overview of the vulnerability is given by the testing team. Usually, there are certain features or keywords that points towards the possible severity level of a vulnerability. Using these keywords in the vulnerability description, a possible estimation of the severity level of vulnerabilities can be given just by their description. In this paper, we are eliminating the need for generating a severity score for software vulnerabilities by using the description of a vulnerability for their prioritization. This study makes use of word embedding and convolution neural network (CNN). The CNN is trained with sufficient samples vulnerability descriptions from all the categories, so that it can capture discriminative words and features for the categorization task. The proposed system helps to channelize the efforts of the testing team by prioritizing the newly found vulnerabilities in three categories based on previous data. The dataset includes three data samples from three different vendors and two mixed vendor data samples.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Anjum M, Agarwal V, Kapur PK, Khatri SK (2020) Two-phase methodology for prioritization and utility assessment of software vulnerabilities. Int J Syst Assur Eng Manag. https://doi.org/10.1007/s13198-020-00957-0

    Article  Google Scholar 

  • Bozorgi M, Saul LK, Savage S, Voelker GM (2010) Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 105–114

  • Conneau A, Schwenk H, Barrault L, Lecun Y (2016) Very deep convolutional networks for text classification. arXiv preprint https://arXiv.org/arXiv:1606.01781

  • CVE Details (2019) The ultimate security vulnerability data source, www.cvedetails.com. [Online]

  • Fruhwirth C, Mannisto T (2009) Improving CVSS-based vulnerability prioritization and response with context information. In: 2009 3rd International symposium on empirical software engineering and measurement, pp 535–544. IEEE

  • Han Z, Li X, Xing Z, Liu H, Feng Z (2017) Learning to predict severity of software vulnerability using only vulnerability description. In: 2017 IEEE international conference on software maintenance and evolution (ICSME), pp 125–136. IEEE

  • https://www.wildml.com/2015/12/implementing-a-cnn-for-text-classification-in-tensorflow/, last Accessed 9 May 2020

  • Ibidapo AO, Zavarsky P, Lindskog D, Ruhl R (2011) An analysis of CVSS v2 environmental scoring. In: 2011 IEEE 3rd international conference on privacy, security, risk and trust and 2011 IEEE third international conference on social computing, pp 1125–1130. IEEE

  • Jacobs J, Romanosky S, Adjerid I, Baker W (2019) Improving vulnerability remediation through better exploit prediction. In: 2019 workshop on the economics of information security

  • Jacobs J, Romanosky S, Edwards B, Roytman M, Adjerid I (2019) Exploit prediction scoring system (EPSS). arXiv preprint https://arXiv.org/arXiv:1908.04856

  • Kim Y (2014) Convolutional neural networks for sentence classification. arXiv preprint https://arXiv.org/arXiv:1408.5882

  • Kapur PK, Yadavali VS, Shrivastava AK (2015) A comparative study of vulnerability discovery modeling and software reliability growth modeling. In: 2015 International conference on futuristic trends on computational analysis and knowledge management (ABLAZE), pp 246–251). IEEE

  • Kudjo, PK, Chen J, Mensah S, Amankwah R, Kudjo C (2020) The effect of Bellwether analysis on software vulnerability severity prediction models. Softw Qual J. https://doi.org/10.1007/s11219-019-09490-1

    Article  Google Scholar 

  • Liu Q, Zhang Y, Kong Y, Wu Q (2012) Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J Syst Softw 85(8):1699–1708

    Article  Google Scholar 

  • Liu Q, Zhang Y (2011) VRSS: a new system for rating and scoring vulnerabilities. Comput Commun 34(3):264–273

    Article  Google Scholar 

  • Mell P, Scarfone K, Romanosky S (2006) Common vulnerability scoring system. IEEE Secur Priv 4(6):85–89

    Article  Google Scholar 

  • Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. FIRST-Forum of Incident Response and Security Teams, North Carolina, vol 1, p 23

    Google Scholar 

  • Narang S, Kapur PK, Damodaran D, Shrivastava AK (2018) Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int J Reliab Qual Saf Eng 25(01):1850002

    Article  Google Scholar 

  • Narang S, Kapur PK, Damodaran D, Shrivastava AK (2017). User-based multi-upgradation vulnerability discovery model. In: 2017 6th international conference on reliability, infocom technologies and optimization (Trends and Future Directions) (ICRITO), pp 400–405. IEEE

  • Peng H, Li J, He Y, Liu Y, Bao M, Wang L, Yang Q (2018) Large-scale hierarchical text classification with recursively regularized deep graph-cnn. In: Proceedings of the 2018 world wide web conference, pp 1063–1072

  • Pennington J, Socher R, Manning C (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532–1543

  • Scarfone Karen, and Peter Mell (2009) An analysis of CVSS version 2 vulnerability scoring. In: Proceedings of the 2009 3rd international symposium on empirical software engineering and measurement. IEEE computer society

  • Schiffman M, Cisco CIAG (2005) A complete guide to the common vulnerability scoring system (CVSS). Forum incident response and security teams. https://www.first.org/

  • Sharma R, Sibal R, Shrivastava AK (2016) Vulnerability discovery modeling for open and closed source software. Int J Secure Softw Eng (IJSSE) 7(4):19–38

    Article  Google Scholar 

  • Sharma R, Singh RK (2018) An improved scoring system for software vulnerability prioritization. In: Kapur PK, Kumar U, Verma AK (eds) Quality IT and business operations. Springer, Singapore, pp 33–43

    Chapter  Google Scholar 

  • Sharma R, Sibal R, Sabharwal S (2018a) Change point modelling in the vulnerability discovery process. In: International conference on advanced informatics for computing research. Springer, Singapore, pp 559–568

  • Sharma R, Sibal R, Sabharwal S (2019) Software Vulnerability Prioritization: a comparative study using TOPSIS and VIKOR techniques. In: Kapur PK, Klochkov Y, Verma AK, Singh G (eds) System performance and management analytics. Springer, Singapore, pp 405–418

    Chapter  Google Scholar 

  • Shrivastava AK, Sharma R, Kapur PK (2015) Vulnerability discovery model for a software system using stochastic differential equation. In; 2015 International conference on futuristic trends on computational analysis and knowledge management (ABLAZE), pp 199–205. IEEE

  • Shrivastava AK, Sharma R (2018) Modeling vulnerability discovery and patching with fixing lag. In: International conference on advanced informatics for computing research. Springer, Singapore, pp 569–578

  • Shrivastava AK, Kapur PK, Bhatt M (2019) Vulnerability discovery and patch modeling: a state of the art. In: Ram M (ed) Mathematics and reliability engineering. Taylor & Francis, London, pp 401–419

    Chapter  Google Scholar 

  • Sibal R, Sharma R, Sabharwal S (2017) Prioritizing software vulnerability types using multi-criteria decision-making techniques. Life Cycle Reliab Saf Eng 6(1):57–67

    Article  Google Scholar 

  • Singh UK, Joshi C, Kanellopoulos D (2019) A framework for zero-day vulnerabilities detection and prioritization. J Inform Secur Appl 46:164–172

    Google Scholar 

  • Spanos G, Angelis L (2015) Impact metrics of security vulnerabilities: analysis and weighing. Inform Secur J: A Global Perspect 24(1–3):57–71

    Google Scholar 

  • Spanos G, Sioziou A, Angelis L (2013) WIVSS: a new methodology for scoring information systems vulnerabilities. In: Proceedings of the 17th panhellenic conference on informatics, pp 83–90. ACM

  • Wang S, Huang M, Deng Z (2018) Densely connected CNN with multi-scale feature attention for text classification. In: IJCAI, pp 4468–4474

  • Wang Y, Yang Y (2012) PVL: a novel metric for single vulnerability rating and its application in IMS. J Comput Inform Syst 8(2):579–590

    Google Scholar 

  • Zhang Y, Wallace B (2015) A sensitivity analysis of (and practitioners' guide to) convolutional neural networks for sentence classification. arXiv preprint https://arXiv.org/arXiv:1510.03820

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruchi Sharma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, R., Sibal, R. & Sabharwal, S. Software vulnerability prioritization using vulnerability description. Int J Syst Assur Eng Manag 12, 58–64 (2021). https://doi.org/10.1007/s13198-020-01021-7

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-020-01021-7

Keywords

Navigation