Open Access iconOpen Access

ARTICLE

Software Vulnerability Mining and Analysis Based on Deep Learning

Shibin Zhao*, Junhu Zhu, Jianshan Peng

State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China

* Corresponding Author: Shibin Zhao. Email: email

(This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)

Computers, Materials & Continua 2024, 80(2), 3263-3287. https://doi.org/10.32604/cmc.2024.041949

Abstract

In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users’ privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this project aims to study Java source code defect detection methods for defects like null pointer reference exception, XSS (Transform), and Structured Query Language (SQL) injection. Also, the project uses open-source Javalang to translate the Java source code, conducts a deep search on the AST to obtain the empty syntax feature library, and converts the Java source code into a dependency graph. The feature vector is then used as the learning target for the neural network. Four types of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Bi-directional Long Short-Term Memory (BiLSTM), and Attention Mechanism + Bidirectional LSTM, are used to investigate various code defects, including blank pointer reference exception, XSS, and SQL injection defects. Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition, verifying the correctness of the method.

Keywords


Cite This Article

APA Style
Zhao, S., Zhu, J., Peng, J. (2024). Software vulnerability mining and analysis based on deep learning. Computers, Materials & Continua, 80(2), 3263-3287. https://doi.org/10.32604/cmc.2024.041949
Vancouver Style
Zhao S, Zhu J, Peng J. Software vulnerability mining and analysis based on deep learning. Comput Mater Contin. 2024;80(2):3263-3287 https://doi.org/10.32604/cmc.2024.041949
IEEE Style
S. Zhao, J. Zhu, and J. Peng, “Software Vulnerability Mining and Analysis Based on Deep Learning,” Comput. Mater. Contin., vol. 80, no. 2, pp. 3263-3287, 2024. https://doi.org/10.32604/cmc.2024.041949



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 480

    View

  • 177

    Download

  • 0

    Like

Share Link