A preview of this full-text is provided by Springer Nature.
Content available from The Journal of Supercomputing
This content is subject to copyright. Terms and conditions apply.
Vol:.(1234567890)
The Journal of Supercomputing (2023) 79:17042–17078
https://doi.org/10.1007/s11227-023-05282-4
1 3
A novel approach forsoftware vulnerability detection
based onintelligent cognitive computing
ChoDoXuan1· DaoHoangMai2· MaCongThanh1· BuiVanCong3
Accepted: 10 April 2023 / Published online: 5 May 2023
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature
2023, corrected publication 2023\
Abstract
Improving and enhancing the effectiveness of software vulnerability detection meth-
ods is urgently needed today. In this study, we propose a new source code vulner-
ability detection method based on intelligent and advanced computational algo-
rithms. It’s a combination of four main processing techniques including (i) Source
Embedding, (ii) Feature Learning, (iii) Resampling Data, and (iv) Classification.
The Source Embedding method will perform the task of analyzing and standardizing
the source code based on the Joern tool and the data mining algorithm. The Feature
Learning model has the function of aggregating and extracting source code attribute
based on node using machine learning and deep learning methods. The Resampling
Data technique will perform equalization of the experimental dataset. Finally, the
Classification model has the function of detecting source code vulnerabilities. The
novelty and uniqueness of the new intelligent cognitive computing method is the
combination and synchronous use of many different data extracting techniques to
compute, represent, and extract the properties of the source code. With this new cal-
culation method, many significant unusual properties and features of the vulnerabil-
ity have been synthesized and extracted. To prove the superiority of the proposed
method, we experiment to detect source code vulnerabilities based on the Verum
dataset, details of this part are presented in the experimental section. The experimen-
tal results show that the method proposed in the paper has brought good results on
all measures. These results have shown to be the best research results for the source
code vulnerability detection task using the Verum dataset according to our survey
to date. With such results, the proposal in this study is not only meaningful in terms
of science but also in practical terms when the method of using intelligent cognitive
computing techniques to analyze and evaluate source code has helped to improve the
efficiency of the source code analysis and vulnerability detection process.
Keywords Source code vulnerability· Source code vulnerability detection·
Code property graph· Source embedding· Data rebalancing· Feature learning·
Classification
Extended author information available on the last page of the article
Content courtesy of Springer Nature, terms of use apply. Rights reserved.