Software Vulnerability Assessment and Classification Using Recurrent Neural Network and LSTM

Authors

  • Ashok V. Markad Department of Information Technology, Amrutvahini COE, Sangamner, Maharashtra, India
  • Dipak R. Patil Department of Computer Engineering, Amrutvahini COE, Sangamner, Maharashtra, India
  • Bharat S. Borkar Department of Information Technology, Amrutvahini COE, Sangamner, Maharashtra, India
  • Vilas S. Ubale Department of Computer & Electronics Engineering, Amrutvahini COE, Sangamner, Maharashtra, India
  • Sunildatta S. Kadlag Department of Electrical Engineering, Amrutvahini COE, Sangamner, Maharashtra, India
  • Manoj A. Wakchaure Department of Computer Engineering, Amrutvahini COE, Sangamner, Maharashtra, India
  • Rohit N. Devikar Department of Information Technology, Amrutvahini COE, Sangamner, Maharashtra, India

Keywords:

LSTM, Bug prediction, ensembles, segmentation, classification, neural network, class imbalance learning, re-sampling methods, software defect prediction

Abstract

Software defect detection is a valuable tool for enhancing the quality of technology and testing management. It allows for the quick identification of flaws in simulation models before the real testing phase begins. These prediction results assist technology designers in efficiently allocating their limited resources to areas that are more susceptible to shortcomings. This research presents a novel method for software bug prediction using deep learning techniques. A Recurrent Neural Network is used to classify source code, using various soft computing approaches. Data balancing for normalisation has included the use of many pre-processing and data filtering procedures. The generation of the Vector Space Model (VSM) has included the use of TF-IDF and related feature extraction approaches. The classification was performed using Recurrent Neural Networks (RNN) based on the training module for both the training and validation datasets. The proposed deep learning framework comprises many optimisation strategies, each with its own distinct advantages and constraints. We have assessed all methodologies and chosen the most superior one. To conduct the observations and test the suggested technique, a range of real-time and synthetic accessible datasets are assessed. The evaluation findings demonstrate that the proposed framework version surpasses both simple models of outstanding quality and complex deep learning classification models.

Downloads

Download data is not yet available.

References

Terada, K.; Watanobe, Y., "Automatic Generation of Fill-in-the-Blank Programming Problems", In Proceedings of the 2019 IEEE 13th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC), Singapore, 1–4 October 2019; pp. 187–193.

Tai, K.S.; Socher, R.; Manning, C.D., "Improved semantic representations from tree-structured long short-term memory networks", In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, Beijing, China, 26–31 July 2015; pp. 1556–1566.

Pedroni, M.; Meyer, B., "Compiler error messages: What can help novices?", In Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, Portland, OR, USA, 12–15 March 2008; pp. 168–172.

Saito, T.; Watanobe, Y., "Learning Path Recommendation System for Programming Education based on Neural Networks", Int. J. Distance Educ. Technol. (Ijdet) 2019, 18, 36–64.

Teshima, Y.; Watanobe, Y., "Bug detection based on LSTM networks and solution codes", In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 7–10 October 2018; pp. 3541–3546.

Fan, G.; Diao, X.; Yu, H.; Yang, K.; Chen, L., "Software Defect Prediction via Attention-Based Recurrent Neural Network", Sci. Program. 2019, 2019, 6230953.

Zhou, Y.; Tong, Y.; Gu, R.; Gall, H., "Combining text mining and data mining for bug report classification", J. Softw. Evol. Process 2016, 28, 150–176.

Jin, K.; Dashbalbar, A.; Yang, G.; Lee, J.-W.; Lee, B., "Bug severity prediction by classifying normal bugs with text and meta-field information", Adv. Sci. Technol. Lett. 2016, 129, 19–24.

Goseva-Popstojanova, K.; Tyo, J., "Identification of security related bug reports via text mining using supervised and unsupervised classification", In Proceedings of the IEEE International Conference on Software Quality, Reliability and Security, Lisbon, Portugal, 16–20 July 2018; pp. 344–355.

Tong, H.; Liu, B.; Wang, S., "Software defect prediction using stacked denoising auto encoders and two-stage ensemble learning", Inf. Softw. Technol. 2018, 96, 94–111.

Singh, H., Ahamad, S., Naidu, G.T., Arangi, V., Koujalagi, A., Dhabliya, D. Application of Machine Learning in the Classification of Data over Social Media Platform (2022) PDGC 2022 - 2022 7th International Conference on Parallel, Distributed and Grid Computing, pp. 669-674.

Veeraiah, D., Mohanty, R., Kundu, S., Dhabliya, D., Tiwari, M., Jamal, S.S., Halifa, A. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques (2022) Computational Intelligence and Neuroscience, 2022, art. no. 4003403, .

Downloads

Published

12.01.2024

How to Cite

Markad, A. V. ., Patil, D. R. ., Borkar, B. S. ., Ubale, V. S. ., Kadlag, S. S. ., Wakchaure, M. A. ., & Devikar, R. N. . (2024). Software Vulnerability Assessment and Classification Using Recurrent Neural Network and LSTM. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 304–313. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4517

Issue

Section

Research Article