Software Vulnerability Assessment and Classification Using Recurrent Neural Network and LSTM
Keywords:
LSTM, Bug prediction, ensembles, segmentation, classification, neural network, class imbalance learning, re-sampling methods, software defect predictionAbstract
Software defect detection is a valuable tool for enhancing the quality of technology and testing management. It allows for the quick identification of flaws in simulation models before the real testing phase begins. These prediction results assist technology designers in efficiently allocating their limited resources to areas that are more susceptible to shortcomings. This research presents a novel method for software bug prediction using deep learning techniques. A Recurrent Neural Network is used to classify source code, using various soft computing approaches. Data balancing for normalisation has included the use of many pre-processing and data filtering procedures. The generation of the Vector Space Model (VSM) has included the use of TF-IDF and related feature extraction approaches. The classification was performed using Recurrent Neural Networks (RNN) based on the training module for both the training and validation datasets. The proposed deep learning framework comprises many optimisation strategies, each with its own distinct advantages and constraints. We have assessed all methodologies and chosen the most superior one. To conduct the observations and test the suggested technique, a range of real-time and synthetic accessible datasets are assessed. The evaluation findings demonstrate that the proposed framework version surpasses both simple models of outstanding quality and complex deep learning classification models.
Downloads
References
Terada, K.; Watanobe, Y., "Automatic Generation of Fill-in-the-Blank Programming Problems", In Proceedings of the 2019 IEEE 13th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC), Singapore, 1–4 October 2019; pp. 187–193.
Tai, K.S.; Socher, R.; Manning, C.D., "Improved semantic representations from tree-structured long short-term memory networks", In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, Beijing, China, 26–31 July 2015; pp. 1556–1566.
Pedroni, M.; Meyer, B., "Compiler error messages: What can help novices?", In Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, Portland, OR, USA, 12–15 March 2008; pp. 168–172.
Saito, T.; Watanobe, Y., "Learning Path Recommendation System for Programming Education based on Neural Networks", Int. J. Distance Educ. Technol. (Ijdet) 2019, 18, 36–64.
Teshima, Y.; Watanobe, Y., "Bug detection based on LSTM networks and solution codes", In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 7–10 October 2018; pp. 3541–3546.
Fan, G.; Diao, X.; Yu, H.; Yang, K.; Chen, L., "Software Defect Prediction via Attention-Based Recurrent Neural Network", Sci. Program. 2019, 2019, 6230953.
Zhou, Y.; Tong, Y.; Gu, R.; Gall, H., "Combining text mining and data mining for bug report classification", J. Softw. Evol. Process 2016, 28, 150–176.
Jin, K.; Dashbalbar, A.; Yang, G.; Lee, J.-W.; Lee, B., "Bug severity prediction by classifying normal bugs with text and meta-field information", Adv. Sci. Technol. Lett. 2016, 129, 19–24.
Goseva-Popstojanova, K.; Tyo, J., "Identification of security related bug reports via text mining using supervised and unsupervised classification", In Proceedings of the IEEE International Conference on Software Quality, Reliability and Security, Lisbon, Portugal, 16–20 July 2018; pp. 344–355.
Tong, H.; Liu, B.; Wang, S., "Software defect prediction using stacked denoising auto encoders and two-stage ensemble learning", Inf. Softw. Technol. 2018, 96, 94–111.
Singh, H., Ahamad, S., Naidu, G.T., Arangi, V., Koujalagi, A., Dhabliya, D. Application of Machine Learning in the Classification of Data over Social Media Platform (2022) PDGC 2022 - 2022 7th International Conference on Parallel, Distributed and Grid Computing, pp. 669-674.
Veeraiah, D., Mohanty, R., Kundu, S., Dhabliya, D., Tiwari, M., Jamal, S.S., Halifa, A. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques (2022) Computational Intelligence and Neuroscience, 2022, art. no. 4003403, .
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.