A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
<p>Process of the methodology used in the literature review.</p> "> Figure 2
<p>Distribution by year of the analysis study.</p> "> Figure 3
<p>Interaction between information security cyber items.</p> "> Figure 4
<p>Risk management process [<a href="#B15-jcp-04-00040" class="html-bibr">15</a>].</p> "> Figure 5
<p>VMS concept.</p> "> Figure 6
<p>CPE extracted from NVD/NIST API related to “3com” vendor.</p> "> Figure 7
<p>Total of CVEs published by NVD with and without the CPE value.</p> "> Figure 8
<p>Total of CVE numbers published per year by NVD.</p> "> Figure 9
<p>Distribution of CPEs number extracted from NVD/CPE DICT by partition.</p> "> Figure 10
<p>Distribution of CPEs extracted from NVD/CVE API by partition.</p> "> Figure 11
<p>Comparison between CPEs extracted from NVD.</p> "> Figure 12
<p>Similarity rate of CPEs between NVD/dictionary and NVD/CVE.</p> "> Figure 13
<p>Taxonomy of vulnerability detection.</p> "> Figure 14
<p>Features of similarity matching-based approach.</p> "> Figure 15
<p>Overview of HermeScan. (Adapted from [<a href="#B54-jcp-04-00040" class="html-bibr">54</a>]).</p> "> Figure 16
<p>Features of graph-based approach.</p> "> Figure 17
<p>Workflow of FUNDED. (Adapted from [<a href="#B55-jcp-04-00040" class="html-bibr">55</a>]).</p> "> Figure 18
<p>Steps to build EDG for SUT. (Adapted from [<a href="#B68-jcp-04-00040" class="html-bibr">68</a>]).</p> "> Figure 19
<p>Features of FM-based approach.</p> "> Figure 20
<p>CyberSPL workflow. (Adapted from [<a href="#B99-jcp-04-00040" class="html-bibr">99</a>].)</p> "> Figure 21
<p>Example of FM construction used by AMADEUS and AMADEUS-Exploit. (Adapted from [<a href="#B106-jcp-04-00040" class="html-bibr">106</a>,<a href="#B107-jcp-04-00040" class="html-bibr">107</a>]).</p> "> Figure 22
<p>Features of AI-based approach.</p> ">
Abstract
:1. Introduction
- Conduct a security vulnerability database study to assess data inconsistency and identify issues;
- Classify and analyze vulnerability detection methods according to multiple approaches;
- Provide details of presentation and comprehensive analysis of the drawbacks and limitations of existing vulnerability detection methods in each approach;
- Categorize existing vulnerability detection methods by approaches based on related papers.
- What are the main methods used in vulnerability detection?
- How do these methods accomplish their goals and what are their limits?
- Is it feasible to combine multiple methods simultaneously to reduce the rate of false positives and negatives in the vulnerability detection process?
2. Research Methodology
- Planning the review, which focuses first on the identification of the need for a review, their proposal, and the development of their protocol;
- Conducting the review involves identifying the research using predefined keywords and search strings, selecting the studies based on inclusion and exclusion criteria, performing a study quality assessment using predefined criteria and checklists, extracting data, and monitoring progress before summarizing findings and providing data synthesis;
- Reporting recommendations and disseminating evidence through a descriptive analysis of findings and insights.
- ACM (Association for Computing Machinery) digital library;
- JSTOR;
- IEEE Xplore digital library;
- MDPI;
- ScienceDirect;
- Scopus;
- Springer;
- Web of Science.
- Papers published within the last 8 years;
- Relevant papers according to the research question posed previously;
- Papers suggesting vulnerability detection methods;
- Methods leveraging the usage of basic security metadata or AI techniques;
- Papers offering well-documented research on the proposed methods.
3. Motivation, Background, and VDB Assessment
3.1. Motivation
- Various configuration systems impact product inventories and technical content of VDBs;
- Product properties, such as name, version, and edition, might change frequently affecting mapping with VDBs and inventory systems;
- Vulnerability databases that list the same product under different properties have inconsistent product names (character and semantics);
- Inconsistencies in vulnerability databases, including both structured and unstructured product names.
- Relevant insights may reveal CVE feeds without CPE entries;
- Some product vulnerabilities, including software, hardware, and operating systems are published without assigned CPE;
- Product identity is not unified across information systems and VDBs;
- Some CVE feeds contain CPE entries that are not in the CPE dictionary;
- The high rate of false positives and negatives in the vulnerability detection process.
3.2. Terminologies and Theoretical Foundations
3.2.1. Cyber Fundamentals
3.2.2. Cyber Concepts
3.3. Security Vulnerability Databases
4. Taxonomy of Vulnerability Detection Approaches and Findings Analysis
4.1. Matching-Based Approach
4.1.1. Matching-Based Approach Methods Description
Method Based on RE
Method Based on Levenshtein Algorithm
(CPE.WFN.PRODUCT = PRODUCT SEARCH TERM).
Method Based on Building CPE
Method Based on TF-IDF
Method Based on Binary X-ray
Method Based on Ratcliff/Obershelp
Method Based on CTPH
Method Based on Jaro–Winkler
Method Based on GPT
Method Based on HermeScan
Authors, Year | Comparison Method | Scope or Ecosystem | Limitations and Challenges | Human Interaction (HI) | Attributes | Prioritization | Scanning Mode |
---|---|---|---|---|---|---|---|
Gawron et al., 2017 [46] | Regular Expression | IT | Incomplete information in log file; No matching between CPE ID/products and CPE/VDBs; Vulnerability without CPE; Vulnerability zero-day. | No | CPE, log file, HPI-VDB, OSVDB, NVD. | No | Passive |
Sanguinoc and Uetz, 2017 [9] | Levenshtein edit distance | IT | Mismatch errors; Similar semantic CPE with different syntax; Large and complex computation; Human intervention is labor intense; CVE description without software product metadata. | Yes | Vendor, Product and version. CPE, CVE. | Yes | Passive and active |
Na et al., 2018 [47] | Building CPE for connected devices | IoT | Dependence on banner text quality, and complexity in managing vague or incomplete data. Deprecation in CPE dictionary; No CPE entries in the CPE dictionary. | No | Banner text, CPE (Product and vendor name). | No | Passive and active |
Elbaz, Rilling, and Morin, 2020 [48] | TF-IDF | IT | Heavily dependent on the quality of text description and in case of lack of relevant keywords, the results may lead to false positives or negatives. Analysis based on description only may output errors; Incomplete metadata in VDBs represent a considerable issue; Limited heuristics may cause occasional inaccuracies. | No | Free-form description, keywords extracted from CPE URI, CPE, CVE. | Yes, the result is the most probable affected software. | Passive |
Xu et al., 2020 [49] | Basic bloc mapping, Greedy Algorithm, Levenshtein distance Algorithm. | IT and software used in IoT devices | BinXray relies on the accurate function matching, as well as a dependance on a binary compiled system; A challenge is raised when a function receives multiple changes at the same location in different versions; Complex and large functions may increase the time consumption for analysis; Remain noise to impact the accuracy. | No, but manual analysis is required to analyze potential vulnerable functions and then, check ambiguous cases. | Vulnerable function (VF); Patched function of a program (PF) and target binary program. | No | Passive |
Ushakov et al., 2021 [5] | Ratcliff/ Obershelp | IT | Name inconsistency issues during the collection of software products; Error-prone mapping due to the obtained score; Manual verification is required in certain steps; Common issues related to the VDBs. | Yes, in some cases. | Vendor, Product and version, CPE, CVE. | No | Passive and active |
Zhao et al., 2023 [50] | Fuzzy matching; Hash algorithms (CTPH and CRC32); Weighted edit distance and Cuckoo filter, and AST. | IT | Extracting and analyzing Abstract Syntax Trees (ASTs) may increase the computational cost in a complex infrastructure; Patching methods differ and could generate false positives; VULDEFF focuses only on syntactic and structural features without handling semantic aspects; The balance between the three thresholds (ξ1, ξ2, and ξ3) should be well set to avoid impacting the accuracy of VULDEFF. | No, but in case of false positive or ambiguous results, validation is required to maintain the accuracy of VULDEFF. | Target function (TF), patch function (PF) and vulnerable function (VF), dataset of vulnerable function and patches. | No | Passive |
McClanahan et al., 2023 [52] | Jaro–Winkler; NLTK snowball stemmer; Cleanco Python library; | OT | The variability in vendor names impacts the accuracy of the matching process; Vulnerabilities published without software description or no CPE at all; Handling abbreviations and acronyms when building exact CPEs; Handling Jaro–Winkler errors during the matching process; Following versioning names over time; Labor-intensive in building the dataset. | Yes, especially for building the dataset. | Dataset of ICS advisories published before July 25, 2023; CPE, CVE. | No | Passive |
McClanahan et al., 2024 [53] | GPT-3; GPT-3.5; GPT-4; LLM and Bing chatbot | Linux system | GPT-3 and GPT-3.5 are not accurate in finding CVSS scores, vectors, and affected products; GPT-4 and Bing chatbot still had issues retrieving correct and precise CVEs; LLM is prone to hallucinations. | Yes, to interact with user-prompted questions. | CVE, CPE, CVSS, Exploits, Mitigation, Google, and NVD. | No | Passive |
Gao et al., 2024 [54] | Fuzzy matching, CFG; RDA | IoT | Build incomplete CFG for complex firmware (obfuscated code or indirect calls); Many interdependencies between functions and libraries may require more computations and resources; Dynamic; Over-tainting constitutes a challenge and leads to incorrect vulnerability reports | Yes | IoT device firmware; Shared libraries; Binary files; 0-day dataset; N-day dataset. | No | Passive |
4.1.2. Finding Analysis
4.2. Graph-Based Approach
4.2.1. Graph-Based Approach Methods Description
Method Based on GGNN
Method Based on SPG
Method Based on Methods and Gremlin Graph
Method Based on EDG
Method Based on Analytic Graph
Method Based on Threat Knowledge Graph
Method Based on LLM
Method Based on Attack Graphs
4.2.2. Findings Analysis
4.3. Feature Modeling-Based Approach
4.3.1. Feature Modeling-Based Approach Methods Description
Method Based on CyberSPL
Method Based on Attack Scenario
Method Based on AMADEUS
Method Based on AMADEUS-Exploit
4.3.2. Findings Analysis
4.4. AI-Based Approach
4.4.1. AI-Based Approach Methods Description
Method Based on BLSTM
Method Based on NER
Method Based on ML
Method Based on Looking-Back-Enabled Machine Learning
Method Based on Inconsistency Measurement
Method Based on Active Learning
Method Based on Repository-Level Evaluation System
Method Based on Gradient Boosting Machine (GBM) and Lasso Regression
4.4.2. Findings Analysis
5. Challenges and Potential Solutions for Automating Vulnerability Detection
5.1. Data Challenges
5.2. Cyber Risks Challenges
5.3. Infrastrucure Challenges
5.4. False Positives and Negatives Challenges
6. Discussion and Synthesis
7. Conclusions and Future Work
- Examine the possibility to build an automated system to collect security events in real time from external sources and perform preprocessing data;
- Build a new vulnerability dataset for well-trained and learning AI models;
- Develop an AI model combined with metaheuristics algorithms or other layers to enhance model capacities in vulnerability detection methods, within different ecosystems.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Top Cybersecurity Statistics for 2024. Available online: https://www.cobalt.io/blog/cybersecurity-statistics-2024 (accessed on 21 July 2024).
- Gartner Identifies Three Factors Influencing Growth in Security Spending. Available online: https://www.gartner.com/en/newsroom/press-releases/2022-10-13-gartner-identifies-three-factors-influencing-growth-i (accessed on 18 April 2024).
- Rossella, M.; Apostolos, M.; ENISA. Foresight Cybersecurity Threats for 2030–Update. Creat. Commons Attrib. 40 Int. CC 40 2024, 7–12. Available online: https://data.europa.eu/doi/10.2824/349493 (accessed on 31 July 2024).
- Pochmara, J.; Świetlicka, A. Cybersecurity of Industrial Systems—A 2023 Report. Electronics 2024, 13, 1191. [Google Scholar] [CrossRef]
- Ushakov, R.; Doynikova, E.; Novikova, E.; Kotenko, I. CPE and CVE Based Technique for Software Security Risk Assessment. In Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, 22–25 September 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 353–356. [Google Scholar]
- Kharat, P.P.; Chawan, P.M. Vulnerability Management System. Int. Res. J. Eng. Technol. 2022, 9, 976–981. [Google Scholar]
- Computer Security Division, I.T.L. Security Content Automation Protocol|CSRC|CSRC. Available online: https://csrc.nist.gov/projects/security-content-automation-protocol (accessed on 18 April 2024).
- Vladimir, D. CPE Ontology. 2021. Available online: https://ceur-ws.org/Vol-2933/paper30.pdf (accessed on 31 July 2024).
- Sanguino, L.A.B.; Uetz, R. Software Vulnerability Analysis Using CPE and CVE. arXiv 2017, arXiv:1705.05347. [Google Scholar]
- Wåreus, E.; Hell, M. Automated CPE Labeling of CVE Summaries with Machine Learning. In Detection of Intrusions and Malware, and Vulnerability Assessment; Maurice, C., Bilge, L., Stringhini, G., Neves, N., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 12223, pp. 3–22. ISBN 978-3-030-52682-5. [Google Scholar]
- Sun, H.; Ou, G.; Zheng, Z.; Liao, L.; Wang, H.; Zhang, Y. Inconsistent Measurement and Incorrect Detection of Software Names in Security Vulnerability Reports. Comput. Secur. 2023, 135, 103477. [Google Scholar] [CrossRef]
- Tranfield, D.; Denyer, D.; Smart, P. Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review. Br. J. Manag. 2003, 14, 207–222. [Google Scholar] [CrossRef]
- Swanson, M.; Hash, J.; Bowen, P. Guide for Developing Security Plans for Federal Information Systems; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2006; p. 47. [Google Scholar]
- Newhouse, W. Multifactor Authentication for E-Commerce; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019; p. 24. [Google Scholar]
- ISO/IEC 27005; Information Security, Cybersecurity and Privacy Protection—Recommendations for the Management of Risks Related to Information Security. ISO: Geneva, Switzerland, 2022.
- Joint Task Force Transformation Initiative. Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018; pp. 21–23. [Google Scholar]
- Isniah, S.; Hardi Purba, H.; Debora, F. Plan Do Check Action (PDCA) Method: Literature Review and Research Issues. J. Sist. Dan Manaj. Ind. 2020, 4, 72–81. [Google Scholar] [CrossRef]
- Joint Task Force Transformation Initiative. Guide for Conducting Risk Assessments; Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012; p. 53. [Google Scholar]
- Stine, K.; Kissel, R.; Barker, W.C.; Fahlsing, J.; Gulick, J. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories. Spec. Publ. 800-60 Revis. 1 2008, 1, 53. [Google Scholar] [CrossRef]
- Ross, R.; Pillitteri, V.; Graubart, R.; Bodeau, D.; McQuaid, R. Developing Cyber-Resilient Systems: A Systems Security Engineering Approach; National Institute of Standards and Technology (U.S.): Gaithersburg, MD, USA, 2021; pp. 17–18+91–92. [Google Scholar]
- National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [Google Scholar] [CrossRef]
- LeMay, E.; Scarfone, K.; Mell, P. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012; pp. 16–17+20. [Google Scholar]
- Nieles, M.; Dempsey, K.; Pillitteri, V.Y. An Introduction to Information Security; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017; pp. 12–13. [Google Scholar]
- Cichonski, P.; Millar, T.; Grance, T.; Scarfone, K. Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012; pp. 34–35. [Google Scholar]
- Franklin, J.; Wergin, C.; Booth, H. CVSS Implementation Guidance; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014; p. 16. [Google Scholar]
- ISO/IEC 27001 ISO/IEC; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems–Requirements. ISO: Geneva, Switzerland, 2022.
- ISO/IEC 27032; Cybersecurity—Guidelines for Internet Security. ISO: Geneva, Switzerland, 2023.
- Johnson, C.S.; Badger, M.L.; Waltermire, D.A.; Snyder, J.; Skorupka, C. Guide to Cyber Threat Information Sharing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016; p. 10. [Google Scholar]
- Dempsey, K.; Eavy, P.; Moore, G. Automation Support for Security Control Assessments. Volume 1: Overview; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017; p. NIST IR 8011-1. [Google Scholar] [CrossRef]
- Cheikes, B.A.; Waltermire, D.; Scarfone, K. Common Platform Enumeration: Naming Specification Version 2.3; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011; p. NIST IR 7695. [Google Scholar] [CrossRef]
- Waltermire, D.; Cichonski, P.; Scarfone, K. Common Platform Enumeration: Applicability Language Specification Version 2.3; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011; p. NIST IR 7698. [Google Scholar] [CrossRef]
- Phillips, A.; Davis, M. Tags for Identifying Languages; Internet Engineering Task Force: Fremont, CA, USA, 2009. [Google Scholar] [CrossRef]
- CPE—Common Platform Enumeration: CPE Specifications. Available online: https://cpe.mitre.org/specification/ (accessed on 21 April 2024).
- Solving Problems for a Safer World|MITRE. Available online: https://www.mitre.org/ (accessed on 13 July 2024).
- Home Page|CISA. Available online: https://www.cisa.gov/ (accessed on 13 July 2024).
- NVD–Home. Available online: https://nvd.nist.gov/ (accessed on 22 April 2024).
- CWE–About CWE. Available online: https://cwe.mitre.org/about/index.html (accessed on 22 April 2024).
- CVSS v4.0 Specification Document. Available online: https://www.first.org/cvss/specification-document (accessed on 20 April 2024).
- Liu, Q.; Zhang, Y. VRSS: A New System for Rating and Scoring Vulnerabilities. Comput. Commun. 2011, 34, 264–273. [Google Scholar] [CrossRef]
- Spanos, G.; Sioziou, A.; Angelis, L. WIVSS: A New Methodology for Scoring Information Systems Vulnerabilities. In Proceedings of the 17th Panhellenic Conference on Informatics, Thessaloniki, Greece, 19–21 September 2013; ACM: New York, NY, USA, 2013; pp. 83–90. [Google Scholar] [CrossRef]
- Sharma, A.; Sabharwal, S.; Nagpal, S. A Hybrid Scoring System for Prioritization of Software Vulnerabilities. Comput. Secur. 2023, 129, 103256. [Google Scholar] [CrossRef]
- Swanson, M.; Bowen, P.; Phillips, A.W.; Gallup, D.; Lynes, D. Contingency Planning Guide for Federal Information Systems; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010; p. 144. [Google Scholar]
- NIST SP 800-53 Rev. 5; Joint Task Force Interagency Working Group Security and Privacy Controls for Information Systems and Organizations Revision 5. National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020; 176–188+370.
- GitHub: Let’s Build from Here. Available online: https://github.com/ (accessed on 8 July 2024).
- Liu, B.; Shi, L.; Cai, Z.; Li, M. Software Vulnerability Discovery Techniques: A Survey. In Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2–4 November 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 152–156. [Google Scholar]
- Gawron, M.; Cheng, F.; Meinel, C. PVD: Passive Vulnerability Detection. In Proceedings of the 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 4–6 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 322–327. [Google Scholar]
- Na, S.; Kim, T.; Kim, H. Service Identification of Internet-Connected Devices Based on Common Platform Enumeration. J. Inf. Process. Syst. 2018, 14, 740–750. [Google Scholar] [CrossRef]
- Elbaz, C.; Rilling, L.; Morin, C. Automated Keyword Extraction from “One-Day” Vulnerabilities at Disclosure. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–9. [Google Scholar]
- Xu, Y.; Xu, Z.; Chen, B.; Song, F.; Liu, Y.; Liu, T. Patch Based Vulnerability Matching for Binary Programs. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, 18–22 July 2020; ACM: New York, NY, USA, 2020; pp. 376–387. [Google Scholar]
- Zhao, Q.; Huang, C.; Dai, L. VULDEFF: Vulnerability Detection Method Based on Function Fingerprints and Code Differences. Knowl.-Based Syst. 2023, 260, 110139. [Google Scholar] [CrossRef]
- Kornblum, J. Identifying Almost Identical Files Using Context Triggered Piecewise Hashing. Digit. Investig. 2006, 3, 91–97. [Google Scholar] [CrossRef]
- McClanahan, K.; Li, Q. Towards Automatically Matching Security Advisories to CPEs: String Similarity-Based Vendor Matching. In Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC)-Workshop on Computing, Networking and Communications, Big Island, HI, USA, 19–22 February 2024. [Google Scholar] [CrossRef]
- McClanahan, K.; Elder, S.; Uwibambe, M.L.; Liu, Y.; Heng, R.; Li, Q. When ChatGPT Meets Vulnerability Management: The Good, the Bad, and the Ugly. In Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC)-Workshop on Computing, Networking and Communications, Big Island, HI, USA, 19–22 February 2024. [Google Scholar] [CrossRef]
- Gao, Z.; Zhang, C.; Liu, H.; Sun, W.; Tang, Z.; Jiang, L.; Chen, J.; Xie, Y. Faster and Better: Detecting Vulnerabilities in Linux-Based IoT Firmware with Optimized Reaching Definition Analysis. In Proceedings of the 2024 Network and Distributed System Security Symposium, San Diego, CA, USA, 26 February–1 March 2024; Internet Society: Reston, VA, USA, 2024. [Google Scholar] [CrossRef]
- Wang, H.; Ye, G.; Tang, Z.; Tan, S.H.; Huang, S.; Fang, D.; Feng, Y.; Bian, L.; Wang, Z. Combining Graph-Based Learning with Automated Data Collection for Code Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1943–1958. [Google Scholar] [CrossRef]
- Zhou, J.; Cui, G.; Hu, S.; Zhang, Z.; Yang, C.; Liu, Z.; Wang, L.; Li, C.; Sun, M. Graph Neural Networks: A Review of Methods and Applications. AI Open 2020, 1, 57–81. [Google Scholar] [CrossRef]
- Noonan, R.E. An Algorithm for Generating Abstract Syntax Trees. Comput. Lang. 1985, 10, 225–236. [Google Scholar] [CrossRef]
- Wen, X.-C.; Chen, Y.; Gao, C.; Zhang, H.; Zhang, J.M.; Liao, Q. Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning. In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, 17–19 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 2275–2286. [Google Scholar]
- Wu, Z.; Pan, S.; Chen, F.; Long, G.; Zhang, C. A Comprehensive Survey on Graph Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2019, 32, 4–24. [Google Scholar] [CrossRef]
- Cho, K.; van Merrienboer, B.; Gulcehre, C.; Bahdanau, D.; Bougares, F.; Schwenk, H.; Bengio, Y. Learning Phrase Representations Using RNN Encoder-Decoder for Statistical Machine Translation 2014. arXiv 2014, arXiv:1406.1078. [Google Scholar]
- Zheng, W.; Jiang, Y.; Su, X. Vu1SPG: Vulnerability Detection Based on Slice Property Graph Representation Learning. In Proceedings of the 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), Wuhan, China, 25–28 October 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 457–467. [Google Scholar]
- Li, Z.; Zou, D.; Xu, S.; Jin, H.; Zhu, Y.; Chen, Z. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 2022, 19, 2244–2258. [Google Scholar] [CrossRef]
- Ferrante, J. The Program Dependence Graph and Its Use in Optimization. ACM Trans. Program. Lang. Syst. 1987, 9, 319–349. [Google Scholar] [CrossRef]
- Yamaguchi, F.; Golde, N.; Arp, D.; Rieck, K. Modeling and Discovering Vulnerabilities with Code Property Graphs. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18–21 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 590–604. [Google Scholar]
- Gensim: Topic Modelling for Humans. Available online: https://radimrehurek.com/gensim/models/word2vec.html (accessed on 1 June 2024).
- Schlichtkrull, M.; Kipf, T.N.; Bloem, P.; van den Berg, R.; Titov, I.; Welling, M. Modeling Relational Data with Graph Convolutional Networks. In Proceedings of the Semantic Web: 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, 3–7 June 2018. [Google Scholar] [CrossRef]
- Tovarnak, D.; Sadlek, L.; Celeda, P. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Virtual, 17–21 May 2021; pp. 986–991. [Google Scholar]
- Longueira-Romero, Á.; Iglesias, R.; Flores, J.L.; Garitano, I. A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics. Sensors 2022, 22, 2126. [Google Scholar] [CrossRef]
- CAPEC—Common Attack Pattern Enumeration and Classification (CAPECTM). Available online: https://capec.mitre.org/ (accessed on 4 May 2024).
- ISA/IEC 62443; Industrial Communication Networks—Network and System Security Series of Standards. ISA: Durham, NC, USA, 2017.
- Autonomy–Open-Source PLC Software. Available online: https://autonomylogic.com/ (accessed on 7 June 2024).
- Alves, T. Thiagoralves/OpenPLC. Available online: https://github.com/thiagoralves/OpenPLC (accessed on 7 June 2024).
- Alves, T. Thiagoralves/OpenPLC_v2. Available online: https://github.com/thiagoralves/OpenPLC_v2 (accessed on 7 June 2024).
- Alves, T. Thiagoralves/OpenPLC_v3. Available online: https://github.com/thiagoralves/OpenPLC_v3 (accessed on 7 June 2024).
- Husák, M.; Khoury, J.; Klisura, Đ.; Bou-Harb, E. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. In Complex Computational Ecosystems; Collet, P., Gardashova, L., El Zant, S., Abdulkarimova, U., Eds.; Lecture Notes in Computer Science; Springer Nature Switzerland: Cham, Switezerland, 2023; Volume 13927, pp. 167–179. ISBN 978-3-031-44354-1. [Google Scholar]
- Jajodia, S.; Liu, P.; Swarup, V.; Wang, C. Cyber Situational Awareness: Issues and Research; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009; ISBN 978-1-4419-0140-8. [Google Scholar]
- Jiang, C.; Coenen, F.; Zito, M. A Survey of Frequent Subgraph Mining Algorithms. Knowl. Eng. Rev. 2013, 28, 75–105. [Google Scholar] [CrossRef]
- Brandes, U. A Faster Algorithm for Betweenness Centrality*. J. Math. Sociol. 2001, 25, 163–177. [Google Scholar] [CrossRef]
- De, S.; Sodhi, R. A PMU Assisted Cyber Attack Resilient Framework against Power Systems Structural Vulnerabilities. Electr. Power Syst. Res. 2022, 206, 107805. [Google Scholar] [CrossRef]
- Shi, Z.; Matyunin, N.; Graffi, K.; Starobinski, D. Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs. ACM Trans. Priv. Secur. 2024, 27, 1–26. [Google Scholar] [CrossRef]
- Bordes, A.; Usunier, N.; Garcia-Duran, A.; Weston, J.; Yakhnenko, O. Translating Embeddings for Modeling Multi-Relational Data. Proc. 26th Int. Conf. Neural Inf. Process. Syst. 2013, 2, 2787–2795. [Google Scholar]
- Trouillon, T.; Welbl, J.; Riedel, S.; Gaussier, É.; Bouchard, G. Complex Embeddings for Simple Link Prediction. In Proceedings of the International Conference on Machine Learning, New York, NY, USA, 19–24 June 2016. [Google Scholar]
- Yang, B.; Yih, W.; He, X.; Gao, J.; Deng, L. Embedding Entities and Relations for Learning and Inference in Knowledge Bases. arXiv 2014. [Google Scholar] [CrossRef]
- Lu, G.; Ju, X.; Chen, X.; Pei, W.; Cai, Z. GRACE: Empowering LLM-Based Software Vulnerability Detection with Graph Structure and in-Context Learning. J. Syst. Softw. 2024, 212, 112031. [Google Scholar] [CrossRef]
- Wu, Y.; Zou, D.; Dou, S.; Yang, W.; Xu, D.; Jin, H. VulCNN: An Image-Inspired Scalable Vulnerability Detection System. In Proceedings of the 44th International Conference on Software Engineering, Pittsburgh, PA, USA, 21 May 2022; ACM: New York, NY, USA, 2022; pp. 2365–2376. [Google Scholar]
- Salayma, M. Threat Modelling in Internet of Things (IoT) Environments Using Dynamic Attack Graphs. Front. Internet Things 2024, 3, 1306465. [Google Scholar] [CrossRef]
- Neo4j–Plateforme de Données de Graphes. Available online: https://neo4j.com/fr/ (accessed on 2 May 2024).
- Project-Kb/MSR2019 at Main · SAP/Project-Kb. Available online: https://github.com/SAP/project-kb/tree/main/MSR2019 (accessed on 17 May 2024).
- SecretPatch SecretPatch/Dataset. Available online: https://github.com/SecretPatch/Dataset (accessed on 17 May 2024).
- NIST Software Assurance Reference Dataset. Available online: https://samate.nist.gov/SARD (accessed on 14 May 2024).
- Wang, Y.; Wang, W.; Joty, S.; Hoi, S.C.H. CodeT5: Identifier-Aware Unified Pre-Trained Encoder-Decoder Models for Code Understanding and Generation. arXiv 2021, arXiv:2109.00859. [Google Scholar]
- Belkina, A.C.; Ciccolella, C.O.; Anno, R.; Halpert, R.; Spidlen, J.; Snyder-Cappione, J.E. Automated Optimized Parameters for T-Distributed Stochastic Neighbor Embedding Improve Visualization and Analysis of Large Datasets. Nat. Commun. 2019, 10, 5415. [Google Scholar] [CrossRef]
- Yang, G.; Chen, X.; Cao, J.; Xu, S.; Cui, Z.; Yu, C.; Liu, K. ComFormer: Code Comment Generation via Transformer and Fusion Method-Based Hybrid Code Representation. In Proceedings of the 2021 8th International Conference on Dependable Systems and Their Applications (DSA), Yinchuan, China, 11–12 September 2021. [Google Scholar] [CrossRef]
- Chakraborty, S.; Krishna, R.; Ding, Y.; Ray, B. Deep Learning Based Vulnerability Detection: Are We There Yet? IEEE Trans. Softw. Eng. 2022, 48, 3280–3296. [Google Scholar] [CrossRef]
- Zhou, Y.; Liu, S.; Siow, J.; Du, X.; Liu, Y. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. Conf. Neural Inf. Process. Syst. 2019. [Google Scholar] [CrossRef]
- Fan, J.; Li, Y.; Wang, S.; Nguyen, T.N. A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries. In Proceedings of the 17th International Conference on Mining Software Repositories, Seoul, Republic of Korea, 29 June 2020; ACM: New York, NY, USA, 2020; pp. 508–512. [Google Scholar]
- Batory, D.; Benavides, D.; Ruiz-Cortes, A. Automated Analysis of Feature Models. Commun. ACM 2006, 49, 45–47. [Google Scholar] [CrossRef]
- Batory, D. Feature Models, Grammars, and Propositional Formulas. In Software Product Lines; Obbink, H., Pohl, K., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3714, pp. 7–20. ISBN 978-3-540-28936-4. [Google Scholar]
- Varela-Vaca, Á.J.; Gasca, R.M.; Ceballos, R.; Gómez-López, M.T.; Torres, P.B. CyberSPL: A Framework for the Verification of Cybersecurity Policy Compliance of System Configurations Using Software Product Lines. Appl. Sci. 2019, 9, 5364. [Google Scholar] [CrossRef]
- Galindo, J.A.; Benavides, D.; Trinidad, P.; Gutiérrez-Fernández, A.-M.; Ruiz-Cortés, A. Automated Analysis of Feature Models: Quo Vadis? Computing 2019, 101, 387–433. [Google Scholar] [CrossRef]
- Brailsford, S.C.; Potts, C.N.; Smith, B.M. Constraint Satisfaction Problems: Algorithms and Applications. Eur. J. Oper. Res. 1999, 119, 557–581. [Google Scholar] [CrossRef]
- Prud’homme, C.; Fages, J.-G.; Lorca, X. Choco-Solver. Available online: https://choco-solver.org/ (accessed on 5 June 2024).
- Benavides, D.; Trinidad, P.; Ruiz-Cortés, A.; Segura, S. FaMa. In Systems and Software Variability Management: Concepts, Tools and Experiences; Capilla, R., Bosch, J., Kang, K.-C., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 163–171. ISBN 978-3-642-36583-6. [Google Scholar]
- Kenner, A.; Dassow, S.; Lausberger, C.; Krüger, J.; Leich, T. Using Variability Modeling to Support Security Evaluations: Virtualizing the Right Attack Scenarios. In Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems, Magdeburg, Germany, 5 February 2020; ACM: New York, NY, USA, 2020; pp. 1–9. [Google Scholar]
- Maynor, D. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research; Maynor, D., Mookhey, K.K., Eds.; Syngress: Burlington, MA, USA, 2007; pp. vii–ix. ISBN 978-1-59749-074-0. [Google Scholar]
- Varela-Vaca, Á.J.; Gasca, R.M.; Carmona-Fombella, J.A.; Gómez-López, M.T. AMADEUS: Towards the AutoMAteD secUrity teSting. In Proceedings of the 24th ACM Conference on Systems and Software Product Line, Montreal, QC, Canada, 19 October 2020; ACM: New York, NY, USA, 2020; Volume A, pp. 1–12. [Google Scholar]
- Varela-Vaca, Á.J.; Borrego, D.; Gómez-López, M.T.; Gasca, R.M.; Márquez, A.G. Feature Models to Boost the Vulnerability Management Process. J. Syst. Softw. 2023, 195, 111541. [Google Scholar] [CrossRef]
- Galindo, J.A.; Benavides, D. A Python Framework for the Automated Analysis of Feature Models: A First Step to Integrate Community Efforts. In Proceedings of the 24th ACM International Systems and Software Product Line Conference, Montreal, QC, Canada, 19 October 2020; ACM: New York, NY, USA, 2020; Volume B, pp. 52–55. [Google Scholar]
- Li, Z.; Zou, D.; Xu, S.; Ou, X.; Jin, H.; Wang, S.; Deng, Z.; Zhong, Y. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proceedings of the 2018 Network and Distributed System Security Symposium, San Diego, CA, USA, 18–21 February 2018; Internet Society: Reston, VA, USA, 2018. [Google Scholar] [CrossRef]
- Keras-Team/Keras. Available online: https://github.com/keras-team/keras (accessed on 1 June 2024).
- Chiu, J.P.C.; Nichols, E. Named Entity Recognition with Bidirectional LSTM-CNNs. Trans. Assoc. Comput. Linguist. 2016, 4, 357–370. [Google Scholar] [CrossRef]
- Sun, P.; Yang, X.; Zhao, X.; Wang, Z. An Overview of Named Entity Recognition. In Proceedings of the 2018 International Conference on Asian Language Processing (IALP), Bandung, Indonesia, 15–17 November 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 273–278. [Google Scholar]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 36, 1735–1780. [Google Scholar] [CrossRef]
- Huff, P.; McClanahan, K.; Le, T.; Li, Q. A Recommender System for Tracking Vulnerabilities. In Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17 August 2021; ACM: New York, NY, USA, 2021; pp. 1–7. [Google Scholar]
- spaCy · Industrial-Strength Natural Language Processing in Python. Available online: https://spacy.io/ (accessed on 25 May 2024).
- Rahutomo, F.; Kitasuka, T.; Aritsugi, M. Semantic Cosine Similarity. In Proceedings of the 7th International Student Conference on Advanced Science and Technology ICAST, Seoul, Republic of Korea, 29–30 October 2012. [Google Scholar]
- Kwak, B.I.; Han, M.L.; Kim, H.K. Cosine Similarity Based Anomaly Detection Methodology for the CAN Bus. Expert Syst. Appl. 2021, 166, 114066. [Google Scholar] [CrossRef]
- Mihoub, A.; Fredj, O.B.; Cheikhrouhou, O.; Derhab, A.; Krichen, M. Denial of Service Attack Detection and Mitigation for Internet of Things Using Looking-Back-Enabled Machine Learning Techniques. Comput. Electr. Eng. 2022, 98, 107716. [Google Scholar] [CrossRef]
- Qu, Y.; Uddin, M.P.; Gan, C.; Xiang, Y.; Gao, L.; Yearwood, J. Blockchain-Enabled Federated Learning: A Survey. ACM Comput. Surv. 2023, 55, 1–35. [Google Scholar] [CrossRef]
- Torres, C.F.; Iannillo, A.K.; Gervais, A.; State, R. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. In Proceedings of the International Conference on Financial Cryptography and Data Security, Virtual, 15 January 2021. [Google Scholar] [CrossRef]
- Sun, X.; Tu, L.; Zhang, J.; Cai, J.; Li, B.; Wang, Y. ASSBert: Active and Semi-Supervised Bert for Smart Contract Vulnerability Detection. J. Inf. Secur. Appl. 2023, 73, 103423. [Google Scholar] [CrossRef]
- Huang, S.; Jin, R.; Zhou, Z. Active Learning by Querying Informative and Representative Examples. Adv. Neural Inf. Process. Syst. 2010, 23. [Google Scholar] [CrossRef] [PubMed]
- Taherkhani, F.; Kazemi, H.; Nasrabadi, N.M. Matrix Completion for Graph-Based Deep Semi-Supervised Learning. In Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, Honolulu, HI, USA, 27 January–1 February 2019. [Google Scholar] [CrossRef]
- Arazo, E.; Ortego, D.; Albert, P.; O’Connor, N.E.; McGuinness, K. Pseudo-Labeling and Confirmation Bias in Deep Semi-Supervised Learning. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–8. [Google Scholar]
- Yalniz, I.Z.; Jégou, H.; Chen, K.; Paluri, M.; Mahajan, D. Billion-Scale Semi-Supervised Learning for Image Classification. arXiv 2019, arXiv:1905.00546. [Google Scholar]
- Devlin, J.; Chang, M.-W.; Lee, K.; Toutanova, K. BERT: Pre-Training of Deep Bidirectional Transformers for Language Understanding. arXiv 2018, arXiv:1810.04805. [Google Scholar]
- Wen, X.-C.; Wang, X.; Chen, Y.; Hu, R.; Lo, D.; Gao, C. VulEval: Towards Repository-Level Evaluation of Software Vulnerability Detection. arXiv 2024, arXiv:2404.15596. [Google Scholar]
- Hou, X.; Zhao, Y.; Liu, Y.; Yang, Z.; Wang, K.; Li, L.; Luo, X.; Lo, D.; Grundy, J.; Wang, H. Large Language Models for Software Engineering: A Systematic Literature Review. arXiv 2023, arXiv:2308.10620v6. [Google Scholar] [CrossRef]
- Touvron, H.; Lavril, T.; Izacard, G.; Martinet, X.; Lachaux, M.-A.; Lacroix, T.; Rozière, B.; Goyal, N.; Hambro, E.; Azhar, F.; et al. LLaMA: Open and Efficient Foundation Language Models. arXiv 2023, arXiv:2302.13971. [Google Scholar]
- Rozière, B.; Gehring, J.; Gloeckle, F.; Sootla, S.; Gat, I.; Tan, X.E.; Adi, Y.; Liu, J.; Sauvestre, R.; Remez, T.; et al. Code Llama: Open Foundation Models for Code. arXiv 2023, arXiv:2308.12950. [Google Scholar]
- ChatGPT. Available online: https://chatgpt.com (accessed on 2 June 2024).
- Tariq, U. Combatting Ransomware in ZephyrOS-Activated Industrial IoT Environments. Heliyon 2024, 10, e29917. [Google Scholar] [CrossRef] [PubMed]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
- Durieux, T.; Ferreira, J.F.; Abreu, R.; Cruz, P. Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, Seoul, Republic of Korea, 27 June 2020; ACM: New York, NY, USA, 2020; pp. 530–541. [Google Scholar]
- SoliAudit VA Dataset. Available online: https://docs.google.com/spreadsheets/u/1/d/17QxTGZA7xNifAV8bQ2A2dJWRRHcmPp3QgPNxwptT9Zw/edit?pli=1&usp=embed_facebook (accessed on 29 May 2024).
- Ghaleb, A.; Pattabiraman, K. How Effective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, 18 July 2020; ACM: New York, NY, USA, 2020; pp. 415–427. [Google Scholar]
- Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [Google Scholar] [CrossRef]
- Amoo, O.O.; Osasona, F.; Atadoga, A.; Ayinla, B.S.; Farayola, O.A.; Abrahams, T.O. Cybersecurity Threats in the Age of IoT: A Review of Protective Measures. Int. J. Sci. Res. Arch. 2024, 11, 1304–1310. [Google Scholar] [CrossRef]
- Ahmad, W.; Rasool, A.; Javed, A.R.; Baker, T.; Jalil, Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics 2021, 11, 16. [Google Scholar] [CrossRef]
- Buda, M.; Maki, A.; Mazurowski, M.A. A Systematic Study of the Class Imbalance Problem in Convolutional Neural Networks. Neural Netw. 2018, 106, 249–259. [Google Scholar] [CrossRef]
- Senanayake, J.; Kalutarage, H.; Al-Kadri, M.O.; Piras, L.; Petrovski, A. Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. In Proceedings of the 20th International Conference on Security and Cryptography, Rome, Italy, 10–12 July 2023; SCITEPRESS—Science and Technology Publications: Setúbal, Portugal, 2023; pp. 659–666. [Google Scholar]
- Rezaeibagha, F.; Mu, Y.; Huang, K.; Chen, L. Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet Things J. 2021, 8, 8056–8063. [Google Scholar] [CrossRef]
- Pinconschi, E.; Reis, S.; Zhang, C.; Abreu, R.; Erdogmus, H.; Păsăreanu, C.S.; Jia, L. Tenet: A Flexible Framework for Machine-Learning-Based Vulnerability Detection. In Proceedings of the 2023 IEEE/ACM 2nd International Conference on AI Engineering–Software Engineering for AI (CAIN), Melbourne, Australia, 15–16 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 102–103. [Google Scholar]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M. Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things. In Security and Privacy Trends in the Industrial Internet of Things; Alcaraz, C., Ed.; Advanced Sciences and Technologies for Security Applications; Springer International Publishing: Cham, Switzerland, 2019; pp. 47–68. ISBN 978-3-030-12329-1. [Google Scholar]
- Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions. J. Supercomput. 2019, 75, 4543–4574. [Google Scholar] [CrossRef]
- Admass, W.S.; Munaye, Y.Y.; Diro, A.A. Cyber Security: State of the Art, Challenges and Future Directions. Cyber Secur. Appl. 2024, 2, 100031. [Google Scholar] [CrossRef]
- Maglaras, L.; Janicke, H.; Ferrag, M.A. Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors 2022, 22, 5105. [Google Scholar] [CrossRef]
- Djenna, A.; Harous, S.; Saidouni, D.E. Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure. Appl. Sci. 2021, 11, 4580. [Google Scholar] [CrossRef]
- Soe, Y.N.; Feng, Y.; Santosa, P.I.; Hartanto, R.; Sakurai, K. Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features. Electronics 2020, 9, 144. [Google Scholar] [CrossRef]
- Long, Z.; Yan, H.; Shen, G.; Zhang, X.; He, H.; Cheng, L. A Transformer-Based Network Intrusion Detection Approach for Cloud Security. J. Cloud Comput. 2024, 13, 5. [Google Scholar] [CrossRef]
- Jameil, A.K.; Al-Raweshidy, H. AI-Enabled Healthcare and Enhanced Computational Resource Management With Digital Twins Into Task Offloading Strategies. IEEE Access 2024, 12, 90353–90370. [Google Scholar] [CrossRef]
- Li, T.; Sahu, A.K.; Talwalkar, A.; Smith, V. Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Process. Mag. 2020, 37, 50–60. [Google Scholar] [CrossRef]
- Okoli, U.I.; Obi, O.C.; Adewusi, A.O.; Abrahams, T.O. Machine Learning in Cybersecurity: A Review of Threat Detection and Defense Mechanisms. World J. Adv. Res. Rev. 2024, 21, 2286–2295. [Google Scholar] [CrossRef]
- Salem, A.H.; Azzam, S.M.; Emam, O.E.; Abohany, A.A. Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques. J. Big Data 2024, 11, 105. [Google Scholar] [CrossRef]
- Denz, R.; Taylor, S. A Survey on Securing the Virtual Cloud. J. Cloud Comput. Adv. Syst. Appl. 2013, 2, 17. [Google Scholar] [CrossRef]
- Guo, W.; Fang, Y.; Huang, C.; Ou, H.; Lin, C.; Guo, Y. HyVulDect: A Hybrid Semantic Vulnerability Mining System Based on Graph Neural Network. Comput. Secur. 2022, 121, 102823. [Google Scholar] [CrossRef]
- Taghavi, S.M.; Feyzi, F. Using Large Language Models to Better Detect and Handle Software Vulnerabilities and Cyber Security Threats, CC BY 4.0 License. 2024. Available online: https://www.researchgate.net/publication/380772943_Using_Large_Language_Models_to_Better_Detect_and_Handle_Software_Vulnerabilities_and_Cyber_Security_Threats (accessed on 31 July 2024). [CrossRef]
- Dokeroglu, T.; Sevinc, E.; Kucukyilmaz, T.; Cosar, A. A Survey on New Generation Metaheuristic Algorithms. Comput. Ind. Eng. 2019, 137, 106040. [Google Scholar] [CrossRef]
- Rajwar, K.; Deep, K.; Das, S. An Exhaustive Review of the Metaheuristic Algorithms for Search and Optimization: Taxonomy, Applications, and Open Challenges. Artif. Intell. Rev. 2023, 56, 13187–13257. [Google Scholar] [CrossRef] [PubMed]
- Nong, Y.; Sharma, R.; Hamou-Lhadj, A.; Luo, X.; Cai, H. Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Softw. Eng. 2023, 49, 1983–2005. [Google Scholar] [CrossRef]
- Chen, Y.; Ding, Z.; Alowain, L.; Chen, X.; Wagner, D. DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hong Kong, China, 16 October 2023; ACM: New York, NY, USA, 2023; pp. 654–668. [Google Scholar]
- Yang, X.; Wang, S.; Li, Y.; Wang, S. Does Data Sampling Improve Deep Learning-Based Vulnerability Detection? Yeas! And Nays! In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, 14–20 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 2287–2298. [Google Scholar]
- Nie, X.; Li, N.; Wang, K.; Wang, S.; Luo, X.; Wang, H. Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). In Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, USA, 12 July 2023; ACM: New York, NY, USA, 2023; pp. 52–63. [Google Scholar]
- Tang, W.; Tang, M.; Ban, M.; Zhao, Z.; Feng, M. CSGVD: A Deep Learning Approach Combining Sequence and Graph Embedding for Source Code Vulnerability Detection. J. Syst. Softw. 2023, 199, 111623. [Google Scholar] [CrossRef]
- Liu, Z.; Jiang, M.; Zhang, S.; Zhang, J.; Liu, Y. A Smart Contract Vulnerability Detection Mechanism Based on Deep Learning and Expert Rules. IEEE Access 2023, 11, 77990–77999. [Google Scholar] [CrossRef]
- Yuan, B.; Lu, Y.; Fang, Y.; Wu, Y.; Zou, D.; Li, Z.; Li, Z.; Jin, H. Enhancing Deep Learning-Based Vulnerability Detection by Building Behavior Graph Model. In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, 14–20 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 2262–2274. [Google Scholar]
- Harzevili, N.S.; Belle, A.B.; Wang, J.; Wang, S.; Ming, Z.; Nagappan, N. A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning. arXiv, 2023. [Google Scholar] [CrossRef]
- Steenhoek, B.; Rahman, M.M.; Jiles, R.; Le, W. An Empirical Study of Deep Learning Models for Vulnerability Detection. In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, 17–19 May 2023. [Google Scholar] [CrossRef]
- Yuan, Y.; Xie, T. SVChecker: A Deep Learning-Based System for Smart Contract Vulnerability Detection. In Proceedings of the International Conference on Computer Application and Information Security (ICCAIS 2021), Wuhan, China, 25 May 2022; Lu, Y., Cheng, C., Eds.; SPIE: Bellingham, WA, USA, 2022; p. 99. [Google Scholar]
- Hussan, B.K.; Rashid, Z.N.; Zeebaree, S.R.M.; Zebari, R.R. Optimal Deep Belief Network Enabled Vulnerability Detection on Smart Environment. J. Smart Internet Things 2022, 2022, 146–162. [Google Scholar] [CrossRef]
- Russell, R.L.; Kim, L.; Hamilton, L.H.; Lazovich, T.; Harer, J.A.; Ozdemir, O.; Ellingwood, P.M.; McConley, M.W. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. In Proceedings of the 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, FL, USA, 17–20 December 2018. [Google Scholar] [CrossRef]
- Zhou, Y.; Sharma, A. Automated Identification of Security Issues from Commit Messages and Bug Reports. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, 21 August 2017; ACM: New York, NY, USA, 2017; pp. 914–919. [Google Scholar]
- Russo, E.R.; Di Sorbo, A.; Visaggio, C.A.; Canfora, G. Summarizing Vulnerabilities’ Descriptions to Support Experts during Vulnerability Assessment Activities. J. Syst. Softw. 2019, 156, 84–99. [Google Scholar] [CrossRef]
- Li, Y.; Wang, S.; Nguyen, T.N. Vulnerability Detection with Fine-Grained Interpretations. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, 20 August 2021; ACM: New York, NY, USA, 2021; pp. 292–303. [Google Scholar]
- Li, D.; Liu, Y.; Huang, J. Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI. Mach. Learn. Knowl. Extr. 2024, 6, 1087–1113. [Google Scholar] [CrossRef]
- Zhang, F.; Huff, P.; McClanahan, K.; Li, Q. A Machine Learning-Based Approach for Automated Vulnerability Remediation Analysis. In Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 29 June–1 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–9. [Google Scholar]
- Hassan, M.d.M.; Ahmad, R.B.; Ghosh, T. SQL Injection Vulnerability Detection Using Deep Learning: A Feature-Based Approach. Indones. J. Electr. Eng. Inform. IJEEI 2021, 9, 702–718. [Google Scholar] [CrossRef]
- Hu, L.; Chang, J.; Chen, Z.; Hou, B. Web Application Vulnerability Detection Method Based on Machine Learning. J. Phys. Conf. Ser. 2021, 1827, 012061. [Google Scholar] [CrossRef]
- Cao, Y.; Zhang, L.; Zhao, X.; Jin, K.; Chen, Z. An Intrusion Detection Method for Industrial Control System Based on Machine Learning. Information 2022, 13, 322. [Google Scholar] [CrossRef]
- Hulayyil, S.B.; Li, S.; Xu, L. Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security. Electronics 2023, 12, 3927. [Google Scholar] [CrossRef]
- Shaukat, K.; Luo, S.; Chen, S.; Liu, D. Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Abdusalomov, A.; Kilichev, D.; Nasimov, R.; Rakhmatullayev, I.; Im Cho, Y. Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees. IEEE Access 2024, 12, 117761–117786. [Google Scholar] [CrossRef]
- Gawand, S.P.; Kumar, M.S. A Comparative Study of Cyber Attack Detection & Prediction Using Machine Learning Algorithms. Preprint 2023. [Google Scholar] [CrossRef]
- Azhagiri, M.; Rajesh, A.; Karthik, S.; Raja, K. An Intrusion Detection System Using Ranked Feature Bagging. Int. J. Inf. Technol. 2023, 16, 1213–1219. [Google Scholar] [CrossRef]
- Rodriguez, E.; Otero, B.; Gutierrez, N.; Canal, R. A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks. IEEE Commun. Surv. Tutor. 2021, 23, 1920–1955. [Google Scholar] [CrossRef]
- Boi, B.; Esposito, C.; Lee, S. VulnHunt-GPT: A Smart Contract Vulnerabilities Detector Based on OpenAI chatGPT. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, Avila, Spain, 8 April 2024; ACM: New York, NY, USA, 2024; pp. 1517–1524. [Google Scholar]
- Ding, Y.; Fu, Y.; Ibrahim, O.; Sitawarin, C.; Chen, X.; Alomair, B.; Wagner, D.; Ray, B.; Chen, Y. Vulnerability Detection with Code Language Models: How Far Are We? arXiv 2024. [Google Scholar] [CrossRef]
- Zhou, X.; Cao, S.; Sun, X.; Lo, D. Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. arXiv 2024, arXiv:2404.02525. [Google Scholar]
- Xu, H.; Wang, S.; Li, N.; Wang, K.; Zhao, Y.; Chen, K.; Yu, T.; Liu, Y.; Wang, H. Large Language Models for Cyber Security: A Systematic Literature Review. arXiv 2024, arXiv:2405.04760. [Google Scholar]
- Yin, X.; Ni, C.; Wang, S. Multitask-Based Evaluation of Open-Source LLM on Software Vulnerability. arXiv 2024, arXiv:2404.02056. [Google Scholar]
- Steenhoek, B.; Rahman, M.M.; Roy, M.K.; Alam, M.S.; Barr, E.T.; Le, W. A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection. arXiv 2024, arXiv:2403.17218. [Google Scholar]
- Li, Z.; Dutta, S.; Naik, M. LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. arXiv 2024, arXiv:2405.17238. [Google Scholar]
- Fang, R.; Bindu, R.; Gupta, A.; Kang, D. LLM Agents Can Autonomously Exploit One-Day Vulnerabilities. arXiv 2024, arXiv:2404.08144. [Google Scholar]
- Zhou, X.; Zhang, T.; Lo, D. Large Language Model for Vulnerability Detection: Emerging Results and Future Directions. In Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, Lisbon, Portugal, 14 April 2024; ACM: New York, NY, USA, 2024; pp. 47–51. [Google Scholar]
- Sun, Y.; Wu, D.; Xue, Y.; Liu, H.; Ma, W.; Zhang, L.; Shi, M.; Liu, Y. LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs’ Vulnerability Reasoning. arXiv 2024, arXiv:2401.16185. [Google Scholar]
- Tóth, R.; Bisztray, T.; Erdodi, L. LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Florence, Italy, 17–20 September 2024. [Google Scholar] [CrossRef]
- Ullah, S.; Han, M.; Pearce, S.P.H.; Coskun, A.; Stringhini, G. LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks. In Proceedings of the IEEE Symposium on Security and Privacy, Francisco, CA, USA, 20–22 May 2024. [Google Scholar] [CrossRef]
- Yao, Y.; Duan, J.; Xu, K.; Cai, Y.; Sun, Z.; Zhang, Y. A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly. High-Confid. Comput. 2024, 4, 100211. [Google Scholar] [CrossRef]
- Mathews, N.S.; Brus, Y.; Aafer, Y.; Nagappan, M.; McIntosh, S. LLbezpeky: Leveraging Large Language Models for Vulnerability Detection. arXiv 2024, arXiv:2401.01269. [Google Scholar]
- Shestov, A.; Levichev, R.; Mussabayev, R.; Maslov, E.; Cheshkov, A.; Zadorozhny, P. Finetuning Large Language Models for Vulnerability Detection. arXiv 2024, arXiv:2401.17010. [Google Scholar]
- Sun, Y.; Wu, D.; Xue, Y.; Liu, H.; Wang, H.; Xu, Z.; Xie, X.; Liu, Y. GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. In Proceedings of the IEEE/ACM 46th International Conference on Software Engineering, Lisbon, Portugal, 12 April 2024; ACM: New York, NY, USA, 2024; pp. 1–13. [Google Scholar]
- Jones, A.; Omar, M. Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework. Land Forces Acad. Rev. 2024, 29, 98–107. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Alwahedi, F.; Battah, A.; Cherif, B.; Mechri, A.; Tihanyi, N. Generative AI and Large Language Models for Cyber Security: All Insights You Need. arXiv 2024, arXiv:2405.12750. [Google Scholar]
- Manjunatha, A.; Kota, K.; Babu, A.S. CVE Severity Prediction from Vulnerability Description—A Deep Learning Approach. Procedia Comput. Sci. 2024, 235, 3105–3117. [Google Scholar] [CrossRef]
- Rawte, V.; Tonmoy, S.M.T.I.; Rajbangshi, K.; Nag, S.; Chadha, A.; Sheth, A.P.; Das, A. FACTOID: FACtual enTailment fOr hallucInation Detection. arXiv 2024, arXiv:2403.19113. [Google Scholar]
- Agrawal, P.; Abutarboush, H.F.; Ganesh, T.; Mohamed, A.W. Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009–2019). IEEE Access 2021, 9, 26766–26791. [Google Scholar] [CrossRef]
- Zeinalpour, A.; McElroy, C.P. Comparing Metaheuristic Search Techniques in Addressing the Effectiveness of Clustering-Based DDoS Attack Detection Methods. Electronics 2024, 13, 899. [Google Scholar] [CrossRef]
- Thomas, M.; Meshram, B.B. DoS Attack Detection Using Aquila Deer Hunting Optimization Enabled Deep Belief Network. Int. J. Web Inf. Syst. 2024, 20, 66–87. [Google Scholar] [CrossRef]
- Syed, R. Cybersecurity Vulnerability Management: A Conceptual Ontology and Cyber Intelligence Alert System. Inf. Manag. 2020, 57, 103334. [Google Scholar] [CrossRef]
- Jia, Y.; Qi, Y.; Shang, H.; Jiang, R.; Li, A. A Practical Approach to Constructing a Knowledge Graph for Cybersecurity. Engineering 2018, 4, 53–60. [Google Scholar] [CrossRef]
- Martínez, S.; Cosentino, V.; Cabot, J. Model-Based Analysis of Java EE Web Security Misconfigurations. Comput. Lang. Syst. Struct. 2017, 49, 36–61. [Google Scholar] [CrossRef]
- Seidl, C.; Winkelmann, T.; Schaefer, I. A Software Product Line of Feature Modeling Notations and Cross-Tree Constraint Languages. 2016, pp. 157–172. Available online: https://dl.gi.de/items/758130c0-32b3-485e-8d9d-04e1e1f94a8f (accessed on 21 July 2024).
- Sawyer, P.; Mazo, R.; Diaz, D.; Salinesi, C.; Hughes, D. Using Constraint Programming to Manage Configurations in Self-Adaptive Systems. Computer 2012, 45, 56–63. [Google Scholar] [CrossRef]
- Felfernig, A.; Walter, R.; Galindo, J.A.; Benavides, D.; Erdeniz, S.P.; Atas, M.; Reiterer, S. Anytime Diagnosis for Reconfiguration. J. Intell. Inf. Syst. 2018, 51, 161–182. [Google Scholar] [CrossRef]
- Varela-Vaca, Á.J.; Galindo, J.A.; Ramos-Gutiérrez, B.; Gómez-López, M.T.; Benavides, D. Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs. In Proceedings of the 23rd International Systems and Software Product Line Conference, Paris, France, 9 September 2019; ACM: New York, NY, USA, 2019; Volume A, pp. 265–276. [Google Scholar]
- Costa, G.; Merlo, A.; Verderame, L.; Armando, A. Automatic Security Verification of Mobile App Configurations. Future Gener. Comput. Syst. 2018, 80, 519–536. [Google Scholar] [CrossRef]
- Murthy, P.V.R.; Shilpa, R.G. Vulnerability Coverage Criteria for Security Testing of Web Applications. In Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 489–494. [Google Scholar]
- Xiong, W.; Lagerström, R. Threat Modeling—A Systematic Literature Review. Comput. Secur. 2019, 84, 53–69. [Google Scholar] [CrossRef]
- Thüm, T.; Kästner, C.; Benduhn, F.; Meinicke, J.; Saake, G.; Leich, T. FeatureIDE: An Extensible Framework for Feature-Oriented Software Development. Sci. Comput. Program. 2014, 79, 70–85. [Google Scholar] [CrossRef]
- Blanco, C.; Rosado, D.G.; Varela-Vaca, Á.J.; Gómez-López, M.T.; Fernández-Medina, E. Onto-CARMEN: Ontology-Driven Approach for Cyber–Physical System Security Requirements Meta-Modelling and Reasoning. Internet Things 2023, 24, 100989. [Google Scholar] [CrossRef]
- Hitesh; Kumari, A.C. Feature Selection Optimization in SPL Using Genetic Algorithm. Procedia Comput. Sci. 2018, 132, 1477–1486. [Google Scholar] [CrossRef]
- Zahoor Chohan, A.; Bibi, A.; Hafeez Motla, Y. Optimized Software Product Line Architecture and Feature Modeling in Improvement of SPL. In Proceedings of the 2017 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 18–20 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 167–172. [Google Scholar]
- Zou, D.; Wang, S.; Xu, S.; Li, Z.; Jin, H. μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 2019, 18, 2224–2236. [Google Scholar] [CrossRef]
- Zhang, J.; Liu, Z.; Hu, X.; Xia, X.; Li, S. Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code. IEEE Trans. Softw. Eng. 2023, 49, 4196–4212. [Google Scholar] [CrossRef]
- Kreyßig, B.; Bartel, A. Analyzing Prerequisites of Known Deserialization Vulnerabilities on Java Applications. In Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, Salerno, Italy, 18–21 June 2024. [Google Scholar] [CrossRef]
- Aladics, T.; Hegedűs, P.; Ferenc, R. An AST-Based Code Change Representation and Its Performance in Just-in-Time Vulnerability Prediction. In Proceedings of the International Conference on Software Technologies, Rome, Italy, 10–12 July 2023. [Google Scholar] [CrossRef]
- Wan, T.; Lu, L.; Xu, H.; Zou, Q. Software Vulnerability Detection via Doc2vec via Path Representation. In Proceedings of the 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Chiang Mai, Thailand, 22–26 October 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar] [CrossRef]
- Liu, R.; Wang, Y.; Xu, H.; Liu, B.; Sun, J.; Guo, Z.; Ma, W. Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graphs. arXiv 2024, arXiv:2404.14719. [Google Scholar]
- Zhao, C.; Tu, T.; Wang, C.; Qin, S. VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG. Appl. Sci. 2023, 13, 9240. [Google Scholar] [CrossRef]
- Wu, P.; Yin, L.; Du, X.; Jia, L.; Dong, W. Graph-Based Vulnerability Detection via Extracting Features from Sliced Code. In Proceedings of the 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China, 11–14 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 38–45. [Google Scholar]
- Wu, Y.; Lu, J.; Zhang, Y.; Jin, S. Vulnerability Detection in C/C++ Source Code with Graph Representation Learning. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Virtual, 27–30 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1519–1524. [Google Scholar]
- Zhang, C.; Xin, Y. Static Vulnerability Detection Based on Class Separation. J. Syst. Softw. 2023, 206, 111832. [Google Scholar] [CrossRef]
- Şahïn, C.B. Semantic-Based Vulnerability Detection by Functional Connectivity of Gated Graph Sequence Neural Networks. Soft Comput. 2023, 27, 5703–5719. [Google Scholar] [CrossRef]
- Gong, K.; Song, X.; Wang, N.; Wang, C.; Zhu, H. SCGformer: Smart Contract Vulnerability Detection Based on Control Flow Graph and Transformer. IET Blockchain 2023, 3, 213–221. [Google Scholar] [CrossRef]
- Yuan, X.; Lin, G.; Mei, H.; Tai, Y.; Zhang, J. Software Vulnerable Functions Discovery Based on Code Composite Feature. J. Inf. Secur. Appl. 2024, 81, 103718. [Google Scholar] [CrossRef]
- Pradel, M.; Sen, K. DeepBugs: A Learning Approach to Name-Based Bug Detection. Proc. ACM Program. Lang. 2018, 2, 1–25. [Google Scholar] [CrossRef]
- Javorník, M.; Komárková, J.; Husák, M. Decision Support for Mission-Centric Cyber Defence. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26 August 2019; ACM: New York, NY, USA, 2019; pp. 1–8. [Google Scholar]
- Husák, M.; Sadlek, L.; Špaček, S.; Laštovička, M.; Javorník, M.; Komárková, J. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Comput. Secur. 2022, 115, 102609. [Google Scholar] [CrossRef]
- Wagner, N.; Sahin, C.S.; Winterrose, M.; Riordan, J.; Pena, J.; Hanson, D.; Streilein, W.W. Towards Automated Cyber Decision Support: A Case Study on Network Segmentation for Security. In Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece, 6–9 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–10. [Google Scholar]
- Chen, X.; Jia, S.; Xiang, Y. A Review: Knowledge Reasoning over Knowledge Graph. Expert Syst. Appl. 2020, 141, 112948. [Google Scholar] [CrossRef]
- Li, X.; Chen, J.; Lin, Z.; Zhang, L.; Wang, Z.; Zhou, M.; Xie, W. A Mining Approach to Obtain the Software Vulnerability Characteristics. In Proceedings of the 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), Shanghai, China, 13–16 August 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 296–301. [Google Scholar]
- Shi, Z.; Matyunin, N.; Graffi, K.; Starobinski, D. Uncovering Product Vulnerabilities with Threat Knowledge Graphs. In Proceedings of the 2022 IEEE Secure Development Conference (SecDev), Atlanta, GA, USA, 18–20 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 84–90. [Google Scholar]
- Wang, X.; He, X.; Cao, Y.; Liu, M.; Chua, T.-S. KGAT: Knowledge Graph Attention Network for Recommendation. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 25 July 2019; pp. 950–958. [Google Scholar]
- Allamanis, M.; Brockschmidt, M.; Khademi, M. Learning to Represent Programs with Graphs. arXiv 2017, arXiv:1711.00740. [Google Scholar]
- Cheng, X.; Wang, H.; Hua, J.; Xu, G.; Sui, Y. DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Trans. Softw. Eng. Methodol. 2021, 30, 1–33. [Google Scholar] [CrossRef]
- Kiran, S.R.A.; Rajper, S.; Shaikh, R.A.; Shah, I.A.; Danwar, S.H. Categorization of CVE Based on Vulnerability Software By Using Machine Learning Techniques. Int. J. Adv. Trends Comput. Sci. Eng. 2021, 10, 2637–2644. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, B. Detection of SQL Injection Attacks Based on Improved TFIDF Algorithm. J. Phys. Conf. Ser. 2019, 1395, 012013. [Google Scholar] [CrossRef]
- Sun, H.; Cui, L.; Li, L.; Ding, Z.; Hao, Z.; Cui, J.; Liu, P. VDSimilar: Vulnerability Detection Based on Code Similarity of Vulnerabilities and Patches. Comput. Secur. 2021, 110, 102417. [Google Scholar] [CrossRef]
- Kim, S.; Woo, S.; Lee, H.; Oh, H. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–24 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 595–614. [Google Scholar]
- Hu, W.; Thing, V.L.L. CPE-Identifier: Automated CPE Identification and CVE Summaries Annotation with Deep Learning and NLP. arXiv 2024, arXiv:2405.13568. [Google Scholar]
- Kanakogi, K.; Washizaki, H.; Fukazawa, Y.; Ogata, S.; Okubo, T.; Kato, T.; Kanuka, H.; Hazeyama, A.; Yoshioka, N. Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Information 2021, 12, 298. [Google Scholar] [CrossRef]
- Reimers, N.; Gurevych, I. Sentence-BERT: Sentence Embeddings Using Siamese BERT-Networks. arXiv 2019, arXiv:1908.10084. [Google Scholar]
- O’Hare, J.; Macfarlane, R.; Lo, O. Identifying Vulnerabilities Using Internet-Wide Scanning Data. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–10. [Google Scholar]
- Wang, X.; Sun, K.; Batcheller, A.; Jajodia, S. Detecting “0-Day” Vulnerability: An Empirical Study of Secret Security Patch in OSS. In Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, OR, USA, 24–27 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 485–492. [Google Scholar]
- Takahashi, T.; Inoue, D. Generating Software Identifier Dictionaries from Vulnerability Database. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 417–420. [Google Scholar]
- Alfasi, D.; Shapira, T.; Barr, A.B. Unveiling Hidden Links Between Unseen Security Entities. arXiv 2024, arXiv:2403.02014. [Google Scholar]
- Chen, T.; Li, L.; Zhu, L.; Li, Z.; Liu, X.; Liang, G.; Wang, Q.; Xie, T. VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model. In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics, Bangkok, Thailand, 11–16 August 2024. [Google Scholar] [CrossRef]
- Aghaei, E.; Al-Shaer, E.; Shadid, W.; Niu, X. Automated CVE Analysis for Threat Prioritization and Impact Prediction. arXiv 2023, arXiv:2309.03040. [Google Scholar]
- Blinowski, G.J.; Piotrowski, P. CVE Based Classification of Vulnerable IoT Systems. In Theory and Applications of Dependable Computer Systems; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2020; Volume 1173, pp. 82–93. ISBN 978-3-030-48255-8. [Google Scholar]
- Jiang, Y.; Atif, Y. Towards Automatic Discovery and Assessment of Vulnerability Severity in Cyber–Physical Systems. Array 2022, 15, 100209. [Google Scholar] [CrossRef]
Format | Description | Representation |
---|---|---|
WFN | Well-Format Name | Cpex = {⟨part, v1⟩, ⟨vendor, v2⟩, ⟨product, v3⟩….., ⟨other, vn⟩} wfn:[part = “a”,vendor = “microsoft”, product = “internet_explorer”, version = “8\.0\.6001”, update = “beta”] |
URI | Uniform Resource Identifiers | CPE = cpe:/{part}:{vendor}:{product}:{version}:{update}:{edition}:{language}. cpe:/a:microsoft:internet_explorer:8.0.6001:beta |
FSB | Format String Binding | cpe:2.3:part:vendor:product:version:update:edition:language:sw_edition:target_sw:target_hw:other cpe:2.3:a:microsoft:internet_explorer:8.0.6001:beta:*:*:*:*:*:* |
VDBs | CVE 1 | NVD 2 | Mitre 3 | VulDB 4 | Security DB 5 | VulnDB 6 | ExploitDB 7 |
---|---|---|---|---|---|---|---|
Operated by | Mitre Corp | NIST | Mitre Corp | Scip AG | Varies | Risk-based security | Offensive security |
Data delivered | CVE ID Description Severity Product Version | CVE ID Description Metrics CPE References | CVE ID CVE Program | Vulnerabilities technical details Exploit availability, Impact References Product affected | Security research papers Exploit security, Events | vulnerability’s technical details Mitigation strategies Exploit information Other Resources | Security vulnerabilities Affected software or technical description of the systems Relevant exploit code |
Free access | Yes | Limited free access, Subscription for more information and services (Commercial or Enterprise) | Limited version is free (Just one product is monitored) | No | Yes | ||
Update process | Regularly | Limited for free version | Daily for limited version and hourly for subscriptions | Regularly | |||
API Support | No | Yes | No | Limited for free version | Not available for limited version | Yes | |
CVE List download | Available | Not available for free version | Not available | Available | |||
Scoring System | CVSS V2, 3 and 4.0 | - | CVSS V2, 3.x and 4.0 | CVSS V2 and V3 | CVSS V2, 3.x and 4.0 | CVSS V2 and V3 |
Authors, Year | Used Method | Scope or Eco-System | Limitations and Challenges | Attributes | Human Interaction (HI) | Prioritization | Scanning Mode |
---|---|---|---|---|---|---|---|
Wang et al., 2020 [55] | GGNN: (PCDG, AST, GRU) Mixture of Expert Model (SVM, RF- KNN, LR and GB-RE). | IT | Data: Many commits in open-source projects includes benign code snippets in the training samples; Data quality assessment: The check process remains manual; ML models: Are dependent on the quality of dataset which needs continuous upgrade; Uncertain situations: the models are predefined to produce high-probability answers which may lead to false positives; Resource-intensive: More time to perform training a huge volume of data and learning from these graphs. | Target: Program Source Code; Data: CVE, NVD, SARD and open-source projects hosted on GitHub; Dataset: SAP [88] for Java and ZVD [89] for C/C++; Expert Models; Conformal Prediction (CP). | Yes, especially in data gathering process, Initial sample labeling (inspecting and labeling) and in continuous learning where predictions are reviewed by developers to provide ground-truth labels. | No, a Binary Decision is given by function detection. | Passive |
Zheng et al., 2021 [61] | SPG: R-GCN-AST- PDG-CPG. | IT | SARD [90] and NVD [36] datasets: present noise and irrelevant information, inconsistencies in training data, inaccurate synthetic samples, limited coverage of vulnerability types for training; SPG: complex to construct, semantic process is resource; Intensive, reducing redundancy can lead to omission of potentially relevant information; Handling variability in code structure impacts effectiveness of SPG generation; VulSPG is focused only on vulnerability detection in programs written in C/C++. | Source code; Outputs of PDG: Data and flows of the program; Semantic Outputs of CPG by using AST and CFG; Syntactic features: slicing criteria to generate (SPG). | Yes, to handle complex interpretation of results, to perform a validation of vulnerability source code, to adjust the model parameters and refine the slicing criteria as well as alter dependencies in SPG construction process. | Yes | Passive |
Tovarnak et al., 2021 [67] | Graph-based methods and Gremlin graph traversal language | IT | Granular details of asset configurations increase the complexity of assets management; Frequent alteration in configurations system and in VDBs; Intensive computation when applying to a large-scale ecosystem; Complete dependence of the accuracy of CVE and CPE published. | Known CVE vulnerabilities (Json Format), and CPE applicability statements (Version 2.3 reference implementation [30,31]). | Yes, for vulnerabilities and device fingerprints, but HI is required again in updating CVE or asset data or modifying the graph structure. | No | Passive |
Longueira-Romero et al., 2022 [68] | EDG model (directed graphs and dynamic tracking); Quantitative Metrics (CVSS- based Metrics and Continuous Assessment) | OT (IACS) | Global dependence of input data accuracy (CVE and CWE); Complexity in managing dynamic updates or upgrade (CVE, patch or firmware); Resource intensiveness: in maintaining EDG model; The used model loses effectiveness in front of the unknown or (zero-days) vulnerabilities. | All CPE under the SUT; Public CVE, CWE and CAPEC; Time-quantitative metrics based on CVSS: for vulnerabilities (M0 to M6) and for weaknesses (M7 and M8). | All the process included in this approach are automatic; nevertheless, periodic reviews may require manual input to ensure accuracy and relevance. | Yes, especially for patching activities. | Passive |
Husak et al., 2023 [75] | Graph-based analytic-graph traversal (DFS and BFS), Community detection, FSM, and graph centrality measures. | IT (Network) | New paradigms (new query languages and adaption to data processing); Lack of comprehensive datasets (high-quality datasets for training and validating graph-based cybersecurity systems); Need for unified ontology (The effectiveness can be limited); Explainability and complexity (difficulties for users to understand and interpret the results). | Network hosts, users, services information, IP addresses, vulnerabilities of CVE (CPE included), and security events; Nmap for scanning (CPE string) and the Neo4j Graph Data Platform for storing and visualizing the data [87]. | Yes, for data interpretation, incident response, decision making and maintenance and updates. | Yes | Passive and Active |
Shi et al., 2023 [80] | Threat knowledge graph (Translating Embeddings: ML model TransE) | IT | Dependance of the external cyber security event; Incomplete vulnerability information or delayed updates; Managing prediction errors and maintaining complexity; Manual analysis is required; The prediction of the association between entities is based on historical data; other newly entities may represent an issue. | CVE, CPE, and CWE from NVD. | No, but in the set-up and defining parameters of the model, human expertise is required to interpret the result. | Yes | Passive |
Lu et al., 2024 [84] | Graph Structural Information Integration (AST-PDG and CFG); LLM (in-context learning); CodeT5 [91] to extract semantic features; T-SNE [92] to reduce feature dimensionality; -SimSBT [93] to generate sequences during the traversal path. | IT | Higher computational costs and resource demands for building a complex graph representation in high-scale ecosystem; Dependence on quality during the in-context learning and domain-specific information; Effectiveness GRACE with other programming language; Certain nuanced or complex semantic information may impact the detection of some vulnerabilities; New vulnerable patterns not existing in the data source. | Tree datasets are used to train models in detection if the code is vulnerable or not. FFmpeg [94] and Qemu [95] and Big-Vul [96]. | Yes, the three modules integrated are fully automated. | No | Passive |
Salayma 2024 [86] | Neo4j, Cypher queries. | IoT | Issues within a large and complex IoT environment; The reachability and attack path computations can face limitations when firewall policies grow in complexity; Dependence on Neo4j and its cypher query language may limit the portability of the solution to other graph databases. | CVE, Attack paths. | Yes, to elaborate queries. | No | Active |
Authors, Year | Used Method | Scope or Eco-System | Limitations and Challenges | Attributes | Human Interaction (HI) | Prioritization | Scanning Mode |
---|---|---|---|---|---|---|---|
Varela-Vaca et al., 2019 [99] | FAMA framework-REST API; ChocoSolver -CSP. | IT | High initial effort: assets cartography and security control identification; Dependency on accurate models: Any error may lead to incorrect diagnosis; Manual updates of FM are required. | Cybersecurity policy, Assets- Cybersecurity Context. | Yes | Yes | Passive |
Kenner et al., 2020 [104] | In this study, throughout the attack scenarios and penetration testing stage, only the specific MSF is defined. | IT | Security events: Lacks quality, difficulties in extracting relevant data and inconsistencies issues; Analysis, extraction, synthesis, and date are performed manually; Additional manual analysis is required to build FM; During the evaluation, errors or technological issues relating to constraints on the environment occur; The suggested model must be heavily modified for many use cases with the goal to be reusable; Maintainability and real-time updates require additional effort to be accomplished in the event that a software system changes. | Vulnerability Databases: NVD. Exploit Databases. Attack Scenario Dataset and Framework: MSF. | Yes | Yes | Passive |
Varela-Vaca et al., 2020 [106] | FaMa; FM: fm.py; Tool: Nmap; web scrapers: scraper.py. | IT | Dependance: relevant key work addition requires to be manually included to enhance accuracy; Assets inventory depends only on NMAP scan results which may contain inconsistencies or omission; Difficulty to manage products whose CPE does not meet specifications and that NMAP is unable to identify; VDBs: inconsistencies and relevant data omission can affect the accuracy of the FMs; There are more cross-time limitations when a significant number of features (CVE and CPE) are included; The FM does not accurately represent the state of assets in terms of RC and CPE; System feature detection is still manual; It will be time-consuming as a result of the scraping mode carried out in a large complex environment. | Vulnerability Databases: NVD; CPE; Running Configuration RC (environments in which the vulnerability can be reproduced); Reports from infrastructure analysis (ports, services,etc, …). | Yes | Yes | Passive and active |
Varela-Vaca et al., 2023 [107] | FaMaPy; Tool: Nmap; web scrapers: scraper.py and exploitdb; scrapper.py; FM: fm.py; | IT | The AMADEUS-exploit still has the same limitations as the AMADEUS framework; Exploit DB: Incomplete, inconsistent, or error data may affect the accuracy of FMs; Misinterpreting the automated analysis and FMs’ reasoning; Need more external validation experts. | NVD, ExploitDB and VulDB; CPE, RC, and key terms. | Yes | Yes | Passive and active |
Authors, Year | Used Method | Scope or Ecosystem | Limitations and Challenges | Attributes | Human Interaction (HI) | Prioritization | Scanning Mode |
---|---|---|---|---|---|---|---|
Li et al., 2018 [109] | RNN (BLSTM); Word2vec; Theano Keras. | IT | Dependance on source code to detect vulnerabilities while complied program remains a challenge; Applicability only in C/C++ and for one vulnerability type (library/API function calls); VulDeePecker does not provide control flow analysis, it only supports data flow analysis; Dependence on the quality of datasets used in model training; Converting code gadget variable length vector representations into fixed-length vectors; The vulnerability detection results depend only on one model; No features to identify the reason behind false positives and negatives results. | Datasets: NVD and SARD; Target programs; Code Gadgets (vector). | Yes, especially in learning phase when Labeling code gadgets. | No | Passive |
Wareus et al., 2020 [10] | NER BLSTM CRF CNN. | IT | Intensive processing power and time are needed to train models; The F-measure, recall, and precision indicate signs of an overfitting, which requires further training and hyperparameter of used model; When dealing with multi-word labels, the model performs less well; Lexicon limitations affect the performance of the proposed model; Complex sentences or unseen words in CVE affect the context understanding (BLSTM and CRF); Dependency on the quality and quantity of NVD data (inconsistence, errors, data lack, rare labels, exposure delay, amount of training data); Multi-word labels present issues that single one and affect the performance of proposed model; A significant number of errors are produced, leading to incorrect predictions (both over- and under-predicting of labels). | Data: NVD CVE ID and CPEs; CoNLL-2003 dataset for NER; CVE summary. | Yes, to handle errors in labeling activities. | No | Passive |
Huff et al., 2021[114] | NLP: SpaCy and Word2Vec; Fuzzy matching: cosine similarity; ML: RF. | IT | Software naming conventions influence matching accuracy; Inventory and NVD discrepancies can affect fuzzy matching and NLP processes; Human confirmation of outcomes influences process flexibility; Large dependency on the quality of the training dataset; The system generates results with false positives and negatives; The performance might have an influence on a vast size of organization; CVE without CPE Metadata remains a significant data constraint. | NVD (CVE and CPE); Names of Software Packages installed within an organization; Dataset (https://github.com/pdhuff/cpe_recommender). | Yes, for reviewing the shortlisted candidate CPEs and confirming matches. | No | Passive |
Mihoub et al., 2022 [118] | MLP, RNN, LSTM, KNN, DT, RF. | IoT | Lack of temporal relationships between DOS and DDOS attacks in the dataset used; Significantly time is required for training and testing phases, which impact quick detection; | Bot-IoT Dataset [133]. | No | No | Passive |
Sun et al., 2023 [11] | NER, RNN, LSTM, Neural network. | IT | The tool’s efficacy is based on the data quality in the nine VDBs; The reward-punishment matrix may provide inaccurate or misleading outcomes; Computationally intensive may influence the tool performances in a large-scale context; The tool may struggle with unclear ambiguous case when software names are not clear or general; The manual verification method may be both time-consuming and labor-intensive. | CVE IDs from NVD, CVE, CNNVD, CNVD, ExploitDB, SecurityFocus, Openwall, (EDB), and SecurityFocus Forum. | Yes, to validate the alerts, use descriptions and data from all vulnerability databases. | No | Passive |
Sun et al., 2023 [119] | Regular expressions; ABI to encode or decode; SMT checker; Bert model; Classifier model; KL divergence; Maximization function ElBO(.); Measuring uncertainty H(.). | Blockchain | Model dependence on the quality and quantity of labeled data used for training; Accumulation of training errors due to incorrect labels when using semi-supervised learning; More time-consuming and less efficient in active learning module; In practical applications, labeling all code data for vulnerability detection remains a complex activity; Possible complexity and computational resources in a large-scale environment. | Labeled Source Code Unlabeled Source Code Datsets: Smartbugs [134], SoliAudit [135], and SolidiFi [136]. | Yes, for manually labeling activities. | No | Passive |
VulEval Wel et al., 2024 [127] | CodeBERT; CodeT5; UniXcoder; LLaMA; CodeLlama; GPT-3.5-turbo; GPT-3.5-instruct. | IT | Focus soley C/C++ and not generalizing well to other programming languages; Dependence on predefined rules and patterns (time-consuming and labor-intensive); Quality of dataset used; The complex nature and scope of a project might impact the accuracy of inter-procedural vulnerability; The semantic-based approach is not very effective; Evaluation in software development environments; Challenges in complied code version. | Dataset: PRIMEVUL Source code target, file and repository. | Yes, for the input and assess the output of the second task. | Yes, for vulnerability-related dependency prediction. | Passive |
Tariq, 2024 [132] | GBM, Lasso Regression | IIoT/ZephyrOS | Issues to detect modern ransomware altering their signature dynamically; GBM and Lasso Regression can encounter compatibility issues with legacy systems; Training steps require extensive time to handle large datasets; Improper tuning of hyperparameters (overfitting) can influence the model detection capacities; Imbalanced datasets can affect the performance of the used model. | Datsets: RanSAP and IoT-23. | No | No | Active |
Category | Domain | Features Trend | Connected Papers |
---|---|---|---|
IA-based approach | Vulnerability detection based on Deep and Machine Learning. | Deep and Machine Learning (CNN, DNN, RNN, LSTM, BLSTM, FNN, VAE, GNN, AEs, GANs, DRL, RF, LR, DT, ETC, VC, BC, AC, GB, XB, GRU, DBN, MLP, K-fold Stacking Model (RF, GNB, KNN, SVM, GB, AdaLR, ADA, SVC, RFC, XAI)). | [62,141,143,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185] |
Vulnerability detection based on OpenAI- Metaheuristic algorithms. | Large Language Model (LLM, GPT-2, GPT-3, GPT-3.5, GPT-4, Llama, PaLM2)-Metaheuristic algorithms (Genetic Algorithm (GA), Genetic Programming (GP), Particle Swarm Optimization (PSO), Teaching–Learning-Based Optimization (TLBO), among others). | [186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201,202,203,204,205,206,207,208] | |
Feature model-based approach | Vulnerability feature model-mapping, dependencies, and correlations of system components. | Cybersecurity knowledge base, reverse engineering, metamodel, Algorithms FM (SubFM/Vendor, SubFM/RC and SubFM/Tree), FaMaPy. | [209,210,211,212,213,214,215,216,217,218,219,220,221,222,223] |
Graph-based approach | Vulnerability detection based on graph structure information related to target input and strengthened by certain AI techniques. | AST-PDG-CPG-Gremlin graph-EDG- Graph-based analytic-Graph traversal- Threat knowledge graph -GNN-SPG- LLM and AI model. | [58,95,156,224,225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240,241,242,243,244,245] |
Matching-based approach | Vulnerability detection based on string-matching algorithm and AI models. | RE–Levenshtein edit distance–TF-IDF- Ratcliff/Obershelp–fuzzy matching; AST–Hash algorithms–Jaro–Winkler–GPT models. | [246,247,248,249,250,251,252,253,254,255,256,257,258,259,260] |
Vulnerability Detection Approaches | Summary of Limits and Drawbacks Related to the Four Aforementioned Approaches. |
---|---|
A matching-based approach |
|
A graph-based approach |
|
A feature model-based approach |
|
An AI-based approach |
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bennouk, K.; Ait Aali, N.; El Bouzekri El Idrissi, Y.; Sebai, B.; Faroukhi, A.Z.; Mahouachi, D. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. J. Cybersecur. Priv. 2024, 4, 853-908. https://doi.org/10.3390/jcp4040040
Bennouk K, Ait Aali N, El Bouzekri El Idrissi Y, Sebai B, Faroukhi AZ, Mahouachi D. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. Journal of Cybersecurity and Privacy. 2024; 4(4):853-908. https://doi.org/10.3390/jcp4040040
Chicago/Turabian StyleBennouk, Khalid, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi, and Dorra Mahouachi. 2024. "A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies" Journal of Cybersecurity and Privacy 4, no. 4: 853-908. https://doi.org/10.3390/jcp4040040
APA StyleBennouk, K., Ait Aali, N., El Bouzekri El Idrissi, Y., Sebai, B., Faroukhi, A. Z., & Mahouachi, D. (2024). A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. Journal of Cybersecurity and Privacy, 4(4), 853-908. https://doi.org/10.3390/jcp4040040