The effect of Bellwether analysis on software vulnerability severity prediction models

dc.contributor.authorMensah, S.
dc.contributor.authorKudjo, P.K.
dc.contributor.authorChen, J.
dc.contributor.authorAmankwah, R.
dc.contributor.authorKudjo, C.
dc.date.accessioned2020-01-31T13:53:48Z
dc.date.available2020-01-31T13:53:48Z
dc.date.issued2020-01-07
dc.descriptionResearch Articleen_US
dc.description.abstractVulnerability severity prediction (VSP) models provide useful insight for vulnerability prioritization and software maintenance. Previous studies have proposed a variety of machine learning algorithms as an important paradigm for VSP. However, to the best of our knowledge, there are no other existing research studies focusing on investigating how a subset of features can be used to improve VSP. To address this deficiency, this paper presents a general framework for VSP using the Bellwether analysis (i.e., exemplary data). First, we apply the natural language processing techniques to the textual descriptions of software vulnerability. Next, we developed an algorithm termed Bellvul to identify and select an exemplary subset of data (referred to as Bellwether) to be considered as the training set to yield improved prediction accuracy against the growing portfolio, within-project cases, and the k-fold cross-validation subset. Finally, we assessed the performance of four machine learning algorithms, namely, deep neural network, logistic regression, k-nearest neighbor, and random forest using the sampled instances. The prediction results of the suggested models and the benchmark techniques were assessed based on the standard classification evaluation metrics such as precision, recall, and F-measure. The experimental result shows that the Bellwether approach achieves F-measure ranging from 14.3% to 97.8%, which is an improvement over the benchmark techniques. In conclusion, the proposed approach is a promising research direction for assisting software engineers when seeking to predict instances of vulnerability records that demand much attention prior to software release.en_US
dc.description.sponsorshipNational Natural Science Foundation of China (NSFC grant numbers: U1836116, 61502205, 61762040, and 61872167), the Project of Jiangsu Provincial Six Talent Peaks (Grant numbers: XYDXXJS-016), the Graduate Research Innovation Project of Jiangsu Province (Grant numbers: KYCX17 1807), and the Postdoctoral Science Foundation of China (Grant numbers: 2015 M571687 and 2015 M581739).en_US
dc.identifier.citationKudjo, P.K., Chen, J., Mensah, S. et al. Software Qual J (2020). https://doi.org/10.1007/s11219-019-09490-1en_US
dc.identifier.otherhttps://doi.org/10.1007/s11219-019-09490-1
dc.identifier.urihttp://ugspace.ug.edu.gh/handle/123456789/34722
dc.language.isoenen_US
dc.publisherSoftware Quality Journalen_US
dc.relation.ispartofseries2020;
dc.subjectBellwetheren_US
dc.subjectSoftware vulnerabilityen_US
dc.subjectFeature selectionen_US
dc.subjectMachine learning algorithmsen_US
dc.subjectSeverityen_US
dc.titleThe effect of Bellwether analysis on software vulnerability severity prediction modelsen_US
dc.typeArticleen_US

Files

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.6 KB
Format:
Item-specific license agreed upon to submission
Description: