Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features

The detection of software vulnerabilities is considered a vital problem in the software security area for a long time. Nowadays, it is challenging to manage software security due to its increased complexity and diversity. So, vulnerability detection applications play a significant part in software development and maintenance. The ability of the forecasting techniques in vulnerability detection is still weak. Thus, one of the efficient defining features methods that have been used to determine the software vulnerabilities is the metaheuristic optimization methods. This paper proposes a novel software vulnerability prediction model based on using a deep learning method and SYMbiotic Genetic algorithm. We are first to apply Diploid Genetic algorithms with deep learning networks on software vulnerability prediction to the best of our knowledge. In this proposed method, a deep SYMbiotic-based genetic algorithm model (DNN-SYMbiotic GAs) is used by learning the phenotyping of dominant-features for software vulnerability prediction problems. The proposed method aimed at increasing the detection abilities of vulnerability patterns with vulnerable components in the software. Comprehensive experiments are conducted on several benchmark datasets; these datasets are taken from Drupal, Moodle, and PHPMyAdmin projects. The obtained results revealed that the proposed method (DNN-SYMbiotic GAs) enhanced vulnerability prediction, which reflects improving software quality prediction.

[1]  R.G.S. Asthana,et al.  CHAPTER 6 – Evolutionary Algorithms and Neural Networks , 2000 .

[2]  Nurdan Akhan Baykan,et al.  Feature selection in network intrusion detection using metaheuristic algorithms , 2018 .

[3]  Hai Jin,et al.  A Comparative Study of Deep Learning-Based Vulnerability Detection System , 2019, IEEE Access.

[4]  Omar Almomani,et al.  A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms , 2020, Symmetry.

[5]  Laith Mohammad Abualigah,et al.  Hybrid clustering analysis using improved krill herd algorithm , 2018, Applied Intelligence.

[6]  Hoa Khanh Dam,et al.  Automatic Feature Learning for Predicting Vulnerable Software Components , 2021, IEEE Transactions on Software Engineering.

[7]  Pavlo Bykovyy,et al.  Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection , 2018, 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS).

[8]  S. Sibi Chakkaravarthy,et al.  LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks , 2018, Neural Computing and Applications.

[9]  Kun Xie,et al.  A new evolutionary neural networks based on intrusion detection systems using multiverse optimization , 2017, Applied Intelligence.

[10]  Laith Abualigah,et al.  Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.

[11]  Laith Mohammad Abualigah,et al.  Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering , 2017, The Journal of Supercomputing.

[12]  L Stepanov,et al.  Approach to estimation of level of information security at enterprise based on genetic algorithm , 2018 .

[13]  Shigang Liu,et al.  A performance evaluation of deep‐learnt features for software vulnerability detection , 2018, Concurr. Comput. Pract. Exp..

[14]  Mohammed Azmi Al-Betar,et al.  Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering , 2017, Expert Syst. Appl..

[15]  Laith Mohammad Abualigah,et al.  A new feature selection method to improve the document clustering using particle swarm optimization algorithm , 2017, J. Comput. Sci..

[16]  Xiaozhen Xue,et al.  Predicting Vulnerable Software Components through Deep Neural Network , 2017, ICDLT '17.

[17]  Akhan Akbulut,et al.  Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.

[18]  Asgarali Bouyer,et al.  An efficient vulnerability-driven method for hardening a program against soft-error using genetic algorithm , 2015, Comput. Electr. Eng..

[19]  Zhiwei Ye,et al.  Modified Naive Bayes Algorithm for Network Intrusion Detection based on Artificial Bee Colony Algorithm , 2018, 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS).

[20]  El-Sayed M. El-kenawy,et al.  WOA + BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network , 2019, Soft Comput..

[21]  Yoshua Bengio,et al.  Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.

[22]  Lizhen Qu,et al.  CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation , 2022, IEEE Transactions on Dependable and Secure Computing.

[23]  Laith Mohammad Abualigah,et al.  Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering , 2018, Studies in Computational Intelligence.

[24]  Shouhuai Xu,et al.  SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities , 2018, IEEE Transactions on Dependable and Secure Computing.

[25]  Tehseen Zia,et al.  Long short-term memory recurrent neural network architectures for Urdu acoustic modeling , 2018, Int. J. Speech Technol..

[26]  Darrell Whitley,et al.  A genetic algorithm tutorial , 1994, Statistics and Computing.

[27]  Onur Ozdemir,et al.  Automated Vulnerability Detection in Source Code Using Deep Representation Learning , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).

[28]  Amir H. Gandomi,et al.  The Arithmetic Optimization Algorithm , 2021, Computer Methods in Applied Mechanics and Engineering.

[29]  Laurie A. Williams,et al.  Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.

[30]  Akhan Akbulut,et al.  Development of a Software Vulnerability Prediction Web Service Based on Artificial Neural Networks , 2017, PAKDD.

[31]  Matteo Matteucci,et al.  Learning behavioral models by recurrent neural networks with discrete latent representations with application to a flexible industrial conveyor , 2020, Comput. Ind..

[32]  Minh Le Nguyen,et al.  Feature weighting and SVM parameters optimization based on genetic algorithms for classification problems , 2016, Applied Intelligence.

[33]  Riccardo Scandariato,et al.  The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models , 2017, IEEE Transactions on Reliability.

[34]  Saurabh Singh,et al.  SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection , 2020, Electronics.

[35]  Jinfu Chen,et al.  A cost-effective strategy for software vulnerability prediction based on bellwether analysis , 2019, ISSTA.

[36]  Jun Wu,et al.  Machine Health Monitoring Using Adaptive Kernel Spectral Clustering and Deep Long Short-Term Memory Recurrent Neural Networks , 2019, IEEE Transactions on Industrial Informatics.

[37]  Laith Mohammad Abualigah,et al.  APPLYING GENETIC ALGORITHMS TO INFORMATION RETRIEVAL USING VECTOR SPACE MODEL , 2015 .

[38]  Geoffrey E. Hinton,et al.  Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.