Research on Software Vulnerability Detection Method Based on Improved CNN Model
A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vuln...
Saved in:
Published in | Scientific programming Vol. 2022; pp. 1 - 8 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
New York
Hindawi
12.07.2022
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vulnerability language, and vectorize it as the input data. Gru model is used to optimize CNN neural network. The organic combination of the two can quickly process the feature data and retain the calling relationship between the codes. Compared with single CNN and RNN model, it has stronger vulnerability detection ability and higher detection accuracy. In contrast, the software algorithm of the improved CNN model has strong vulnerability detection ability and higher detection accuracy. In terms of training loss rate, the DNN + Gru model is 17.2% lower than the single RNN model, 10.5% lower than the single CNN model, and 7% lower than the VulDeePecker model. |
---|---|
AbstractList | A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vulnerability language, and vectorize it as the input data. Gru model is used to optimize CNN neural network. The organic combination of the two can quickly process the feature data and retain the calling relationship between the codes. Compared with single CNN and RNN model, it has stronger vulnerability detection ability and higher detection accuracy. In contrast, the software algorithm of the improved CNN model has strong vulnerability detection ability and higher detection accuracy. In terms of training loss rate, the DNN + Gru model is 17.2% lower than the single RNN model, 10.5% lower than the single CNN model, and 7% lower than the VulDeePecker model. |
Author | Qiang, Gao |
Author_xml | – sequence: 1 givenname: Gao orcidid: 0000-0001-7743-6353 surname: Qiang fullname: Qiang, Gao organization: Shandong Management UniversitySchool of Labor RelationsJinanShandong 250357Chinasdu.edu.cn |
BookMark | eNp9kMtqwzAQRUVJoUnaXT_A0GXrRpIlW162SR-BPKAvuhOyPSIOjpVKSkP-vjLJugzD3MWZmcsdoF5rWkDomuB7QjgfUUzpiDFGk4ydoT4RGY9zkn_3gsZcxDll7AINnFtjTATBuI-Wb-BA2XIVmTZ6N9rvlYXoa9e0YFVRN7U_RBPwUPo6AHPwK1NFj8pB1S1MN1trfoMeLxbR3FTQXKJzrRoHV6c5RJ_PTx_j13i2fJmOH2ZxSXPmgxOuhWaheZ4VrKhSQhmURSkwpgqoTnWeQSUoTzvToCoROskowSpJNSRDdHO8Gwz87MB5uTY724aXkqZ5wtNQWaDujlRpjXMWtNzaeqPsQRIsu8hkF5k8RRbw2yO-qttK7ev_6T-rBmwz |
Cites_doi | 10.1038/nature16961 10.1109/72.554195 10.1145/2187671.2187673 10.1109/tse.2010.81 10.1109/72.701181 |
ContentType | Journal Article |
Copyright | Copyright © 2022 Gao Qiang. Copyright © 2022 Gao Qiang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
Copyright_xml | – notice: Copyright © 2022 Gao Qiang. – notice: Copyright © 2022 Gao Qiang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1155/2022/4442374 |
DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Technology Research Database |
Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1875-919X |
Editor | Liu, Jie |
Editor_xml | – sequence: 1 givenname: Jie surname: Liu fullname: Liu, Jie |
EndPage | 8 |
ExternalDocumentID | 10_1155_2022_4442374 |
GroupedDBID | .DC 0R~ 24P 4.4 5VS AAFWJ AAJEY ABJNI ACCMX ACGFS ADBBV AENEX ALMA_UNASSIGNED_HOLDINGS ASPBG AVWKF BCNDV DU5 EBS EST ESX H13 HZ~ IOS KQ8 MIO MV1 NGNOM O9- OK1 RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c294t-925f8f4f8f597b4bd6124ecbc8002ae2f6f97ed82569244ead8ead37210a36fe3 |
IEDL.DBID | RHX |
ISSN | 1058-9244 |
IngestDate | Fri Jul 25 09:29:59 EDT 2025 Tue Jul 01 02:50:13 EDT 2025 Wed Apr 16 06:25:26 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c294t-925f8f4f8f597b4bd6124ecbc8002ae2f6f97ed82569244ead8ead37210a36fe3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7743-6353 |
OpenAccessLink | https://dx.doi.org/10.1155/2022/4442374 |
PQID | 2693565657 |
PQPubID | 2046410 |
PageCount | 8 |
ParticipantIDs | proquest_journals_2693565657 crossref_primary_10_1155_2022_4442374 hindawi_primary_10_1155_2022_4442374 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-07-12 |
PublicationDateYYYYMMDD | 2022-07-12 |
PublicationDate_xml | – month: 07 year: 2022 text: 2022-07-12 day: 12 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | Scientific programming |
PublicationYear | 2022 |
Publisher | Hindawi John Wiley & Sons, Inc |
Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
References | J. Saxe (15) 2017 S. Chen (7) 2016 Y.-L. Boureau (13) 2010; 32 F. Wu (17) K. Lu (3) 2013 H. Perl (5) 1 Z. Li (8) C. Neubauer (22) 1998; 9 J. Su (18) Z. Qu (16) G. Pan (4) 2012; 39 Z. Li (6) 9 B. Chernis (10) M. D. Zeiler (12) 2013 V. Nair (19) R. Grosu (11) 2005 Y. Xia (2) 2006; 33 20 D. Erhan (14) 2010; 11 21 |
References_xml | – ident: 8 article-title: VulDeePecker: a deep learning-based system for vulnerability detection – ident: 20 doi: 10.1038/nature16961 – volume-title: Research and Implementation of Android Malicious Application Detection Technology Based on Deep Learning algorithm year: 2016 ident: 7 – start-page: 1298 ident: 17 article-title: Vulnerability detection withdeep learning – year: 2013 ident: 12 article-title: Stochastic pooling for regularzition of deep convolutional neural networks – ident: 16 article-title: A unsupervised learningmethod of anomaly detection using GRU – volume: 32 start-page: 111 issue: 4 year: 2010 ident: 13 article-title: A theoretical analusis of feature pooling in visual recognition publication-title: International Conference on Machine Learning – volume-title: Research and Implementation of Vulnerability Attack Detection Technology Based on Dynamic Taint Analysis year: 2013 ident: 3 – year: 2017 ident: 15 article-title: Xpose:a character-level convolutionalneural network with embeddings for detecting maliciousURLs, file paths and registry keys – volume: 11 start-page: 625 issue: 3 year: 2010 ident: 14 article-title: Why does unsupervised pre-training help deep learning? publication-title: Journal of Machine Learning Research – start-page: 807 ident: 19 article-title: Rectified linear units implement restored boltzmann machines – volume: 33 start-page: 279 issue: 10 year: 2006 ident: 2 article-title: Research on security vulnerability detection technology based on static analysis publication-title: Computer Science – start-page: 201 ident: 6 article-title: VulPecker:an automated vulnerabilitydetection system based on code similarity analysis – start-page: 3302 ident: 18 article-title: Lattice-based recurrent neuralnetwork encoders for neural machine translation – volume: 39 start-page: 51 issue: s1 year: 2012 ident: 4 article-title: XSS vulnerability discovery based on static analysis and dynamic detection publication-title: Computer Science – ident: 21 doi: 10.1109/72.554195 – ident: 1 doi: 10.1145/2187671.2187673 – start-page: 426 ident: 5 article-title: VccFinder: finding potential vulnerabilities in opensource projects to assistcode audits – ident: 9 doi: 10.1109/tse.2010.81 – volume-title: Monte Carlo Model checking//Tools and Algorithms Forthe Construction and Analysis of Systems year: 2005 ident: 11 – volume: 9 start-page: 685 issue: 4 year: 1998 ident: 22 article-title: Evaluation of convolutional neural networks for visual regression publication-title: IEEE Transactions on Neural Networks doi: 10.1109/72.701181 – start-page: 31 ident: 10 article-title: Machine learning methods for softwarevulnerability detection |
SSID | ssj0018100 |
Score | 2.2797208 |
Snippet | A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software,... |
SourceID | proquest crossref hindawi |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Artificial neural networks Deep learning Libraries Neural networks Neurons Open source software Propagation Public domain Software Software reliability |
Title | Research on Software Vulnerability Detection Method Based on Improved CNN Model |
URI | https://dx.doi.org/10.1155/2022/4442374 https://www.proquest.com/docview/2693565657 |
Volume | 2022 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED_cQPDFb3E6JQ_zsZilSdo-6nQMYVPQyd5KsqYojE62juF_710_BN2DPgQaaAr95XJ3v-RyB9BJtLDcV4kXqQQJSqqVZ7izHpm6gO5eO0O3kYcjPRjLh4maVEmSlptH-GjtiJ6LaykpfkM2oIECRqR8MPk-LAi7vEw6oHDtormq49t_jf1hebbfiPKu3zdUcGFX-vuwWzmE7KacwQPYctkh7NXFFli19o7gsY6RY_OMPaPyXJuFY6-rGaWNLiJcP9mdy4vIqowNi8LQ7BZtVEIDyr0DfO6NRozqn82OYdy_f-kNvKoagjcVkczxz1QaphIbcgArbYK-iXRTOyWXzziR6jQKXIKMTxMIKCEhNh8ZHje-Tp1_As1snrlTYKifQ25FZHiIzBh1lsK-My4MhDERFy24qpGKP8qkF3FBFpSKCdG4QrQFnQrGP15r1xjH1QpZxkJHPjmTKjj731fOYYe6tK_aFW1o5ouVu0CHILeX0BDy6bIQii8eZ6xp |
linkProvider | Hindawi Publishing |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Software+Vulnerability+Detection+Method+Based+on+Improved+CNN+Model&rft.jtitle=Scientific+programming&rft.au=Gao+Qiang&rft.date=2022-07-12&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1058-9244&rft.eissn=1875-919X&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F4442374&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1058-9244&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1058-9244&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1058-9244&client=summon |