Research on Software Vulnerability Detection Method Based on Improved CNN Model

A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vuln...

Full description

Saved in:
Bibliographic Details
Published inScientific programming Vol. 2022; pp. 1 - 8
Main Author Qiang, Gao
Format Journal Article
LanguageEnglish
Published New York Hindawi 12.07.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vulnerability language, and vectorize it as the input data. Gru model is used to optimize CNN neural network. The organic combination of the two can quickly process the feature data and retain the calling relationship between the codes. Compared with single CNN and RNN model, it has stronger vulnerability detection ability and higher detection accuracy. In contrast, the software algorithm of the improved CNN model has strong vulnerability detection ability and higher detection accuracy. In terms of training loss rate, the DNN + Gru model is 17.2% lower than the single RNN model, 10.5% lower than the single CNN model, and 7% lower than the VulDeePecker model.
AbstractList A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software, extract the characteristics from the static code by using the program slicing technology, establish the vulnerability library, standardize the vulnerability language, and vectorize it as the input data. Gru model is used to optimize CNN neural network. The organic combination of the two can quickly process the feature data and retain the calling relationship between the codes. Compared with single CNN and RNN model, it has stronger vulnerability detection ability and higher detection accuracy. In contrast, the software algorithm of the improved CNN model has strong vulnerability detection ability and higher detection accuracy. In terms of training loss rate, the DNN + Gru model is 17.2% lower than the single RNN model, 10.5% lower than the single CNN model, and 7% lower than the VulDeePecker model.
Author Qiang, Gao
Author_xml – sequence: 1
  givenname: Gao
  orcidid: 0000-0001-7743-6353
  surname: Qiang
  fullname: Qiang, Gao
  organization: Shandong Management UniversitySchool of Labor RelationsJinanShandong 250357Chinasdu.edu.cn
BookMark eNp9kMtqwzAQRUVJoUnaXT_A0GXrRpIlW162SR-BPKAvuhOyPSIOjpVKSkP-vjLJugzD3MWZmcsdoF5rWkDomuB7QjgfUUzpiDFGk4ydoT4RGY9zkn_3gsZcxDll7AINnFtjTATBuI-Wb-BA2XIVmTZ6N9rvlYXoa9e0YFVRN7U_RBPwUPo6AHPwK1NFj8pB1S1MN1trfoMeLxbR3FTQXKJzrRoHV6c5RJ_PTx_j13i2fJmOH2ZxSXPmgxOuhWaheZ4VrKhSQhmURSkwpgqoTnWeQSUoTzvToCoROskowSpJNSRDdHO8Gwz87MB5uTY724aXkqZ5wtNQWaDujlRpjXMWtNzaeqPsQRIsu8hkF5k8RRbw2yO-qttK7ev_6T-rBmwz
Cites_doi 10.1038/nature16961
10.1109/72.554195
10.1145/2187671.2187673
10.1109/tse.2010.81
10.1109/72.701181
ContentType Journal Article
Copyright Copyright © 2022 Gao Qiang.
Copyright © 2022 Gao Qiang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Gao Qiang.
– notice: Copyright © 2022 Gao Qiang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2022/4442374
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Technology Research Database

Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1875-919X
Editor Liu, Jie
Editor_xml – sequence: 1
  givenname: Jie
  surname: Liu
  fullname: Liu, Jie
EndPage 8
ExternalDocumentID 10_1155_2022_4442374
GroupedDBID .DC
0R~
24P
4.4
5VS
AAFWJ
AAJEY
ABJNI
ACCMX
ACGFS
ADBBV
AENEX
ALMA_UNASSIGNED_HOLDINGS
ASPBG
AVWKF
BCNDV
DU5
EBS
EST
ESX
H13
HZ~
IOS
KQ8
MIO
MV1
NGNOM
O9-
OK1
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c294t-925f8f4f8f597b4bd6124ecbc8002ae2f6f97ed82569244ead8ead37210a36fe3
IEDL.DBID RHX
ISSN 1058-9244
IngestDate Fri Jul 25 09:29:59 EDT 2025
Tue Jul 01 02:50:13 EDT 2025
Wed Apr 16 06:25:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-925f8f4f8f597b4bd6124ecbc8002ae2f6f97ed82569244ead8ead37210a36fe3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7743-6353
OpenAccessLink https://dx.doi.org/10.1155/2022/4442374
PQID 2693565657
PQPubID 2046410
PageCount 8
ParticipantIDs proquest_journals_2693565657
crossref_primary_10_1155_2022_4442374
hindawi_primary_10_1155_2022_4442374
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-07-12
PublicationDateYYYYMMDD 2022-07-12
PublicationDate_xml – month: 07
  year: 2022
  text: 2022-07-12
  day: 12
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Scientific programming
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References J. Saxe (15) 2017
S. Chen (7) 2016
Y.-L. Boureau (13) 2010; 32
F. Wu (17)
K. Lu (3) 2013
H. Perl (5)
1
Z. Li (8)
C. Neubauer (22) 1998; 9
J. Su (18)
Z. Qu (16)
G. Pan (4) 2012; 39
Z. Li (6)
9
B. Chernis (10)
M. D. Zeiler (12) 2013
V. Nair (19)
R. Grosu (11) 2005
Y. Xia (2) 2006; 33
20
D. Erhan (14) 2010; 11
21
References_xml – ident: 8
  article-title: VulDeePecker: a deep learning-based system for vulnerability detection
– ident: 20
  doi: 10.1038/nature16961
– volume-title: Research and Implementation of Android Malicious Application Detection Technology Based on Deep Learning algorithm
  year: 2016
  ident: 7
– start-page: 1298
  ident: 17
  article-title: Vulnerability detection withdeep learning
– year: 2013
  ident: 12
  article-title: Stochastic pooling for regularzition of deep convolutional neural networks
– ident: 16
  article-title: A unsupervised learningmethod of anomaly detection using GRU
– volume: 32
  start-page: 111
  issue: 4
  year: 2010
  ident: 13
  article-title: A theoretical analusis of feature pooling in visual recognition
  publication-title: International Conference on Machine Learning
– volume-title: Research and Implementation of Vulnerability Attack Detection Technology Based on Dynamic Taint Analysis
  year: 2013
  ident: 3
– year: 2017
  ident: 15
  article-title: Xpose:a character-level convolutionalneural network with embeddings for detecting maliciousURLs, file paths and registry keys
– volume: 11
  start-page: 625
  issue: 3
  year: 2010
  ident: 14
  article-title: Why does unsupervised pre-training help deep learning?
  publication-title: Journal of Machine Learning Research
– start-page: 807
  ident: 19
  article-title: Rectified linear units implement restored boltzmann machines
– volume: 33
  start-page: 279
  issue: 10
  year: 2006
  ident: 2
  article-title: Research on security vulnerability detection technology based on static analysis
  publication-title: Computer Science
– start-page: 201
  ident: 6
  article-title: VulPecker:an automated vulnerabilitydetection system based on code similarity analysis
– start-page: 3302
  ident: 18
  article-title: Lattice-based recurrent neuralnetwork encoders for neural machine translation
– volume: 39
  start-page: 51
  issue: s1
  year: 2012
  ident: 4
  article-title: XSS vulnerability discovery based on static analysis and dynamic detection
  publication-title: Computer Science
– ident: 21
  doi: 10.1109/72.554195
– ident: 1
  doi: 10.1145/2187671.2187673
– start-page: 426
  ident: 5
  article-title: VccFinder: finding potential vulnerabilities in opensource projects to assistcode audits
– ident: 9
  doi: 10.1109/tse.2010.81
– volume-title: Monte Carlo Model checking//Tools and Algorithms Forthe Construction and Analysis of Systems
  year: 2005
  ident: 11
– volume: 9
  start-page: 685
  issue: 4
  year: 1998
  ident: 22
  article-title: Evaluation of convolutional neural networks for visual regression
  publication-title: IEEE Transactions on Neural Networks
  doi: 10.1109/72.701181
– start-page: 31
  ident: 10
  article-title: Machine learning methods for softwarevulnerability detection
SSID ssj0018100
Score 2.2797208
Snippet A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of the software,...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Artificial neural networks
Deep learning
Libraries
Neural networks
Neurons
Open source software
Propagation
Public domain
Software
Software reliability
Title Research on Software Vulnerability Detection Method Based on Improved CNN Model
URI https://dx.doi.org/10.1155/2022/4442374
https://www.proquest.com/docview/2693565657
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED_cQPDFb3E6JQ_zsZilSdo-6nQMYVPQyd5KsqYojE62juF_710_BN2DPgQaaAr95XJ3v-RyB9BJtLDcV4kXqQQJSqqVZ7izHpm6gO5eO0O3kYcjPRjLh4maVEmSlptH-GjtiJ6LaykpfkM2oIECRqR8MPk-LAi7vEw6oHDtormq49t_jf1hebbfiPKu3zdUcGFX-vuwWzmE7KacwQPYctkh7NXFFli19o7gsY6RY_OMPaPyXJuFY6-rGaWNLiJcP9mdy4vIqowNi8LQ7BZtVEIDyr0DfO6NRozqn82OYdy_f-kNvKoagjcVkczxz1QaphIbcgArbYK-iXRTOyWXzziR6jQKXIKMTxMIKCEhNh8ZHje-Tp1_As1snrlTYKifQ25FZHiIzBh1lsK-My4MhDERFy24qpGKP8qkF3FBFpSKCdG4QrQFnQrGP15r1xjH1QpZxkJHPjmTKjj731fOYYe6tK_aFW1o5ouVu0CHILeX0BDy6bIQii8eZ6xp
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Software+Vulnerability+Detection+Method+Based+on+Improved+CNN+Model&rft.jtitle=Scientific+programming&rft.au=Gao+Qiang&rft.date=2022-07-12&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1058-9244&rft.eissn=1875-919X&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F4442374&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1058-9244&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1058-9244&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1058-9244&client=summon