Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery
Journal: International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (Vol.10, No. 3)Publication Date: 2021-06-11
Authors : Imdad Ali Shah Samina Rajper Noor ZamanJhanjhi;
Page : 2109-2126
Keywords : ;
Abstract
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. In the field of computer security, vulnerability is a fault that might be exploited as a risk artist that performs unlawful activities inside computer security. The attackers have several different fitting tools and they are taking advantage to operate software illegally and are using it for getting self-profit. Additionally, that helps to expose and identify the violence external. Weakness management remains a repeating exercise to identify, remediating, and justifying weaknesses. These exercises normally send software faults in computing security. The meaning of using weakness with the same risk might go to misperception. It is possible to have a major effect because of possible stability and the window of weakness presented a risk hole in the software and required to fruitfully finish and smoothly operate. A security room has to be set up (zero-day invaders). Software Security Faults stand serious among unavoidable complications in the realm of computer risk. In this study, we have provided a comprehensive review of three book chapters, more than a hundred research articles papers, and several associated papers of different work that have been studied within the capacity of SVA and discovery applying ML and data-mining techniques. The earlier work has been thoroughly read and an adequately comprehensive summary has been provided in table-1. ML techniques that can professionally handle these attacks and we expect the net result of this survey article to help indesigning the new detection model for identifying the above-mentioned attacks.
Other Latest Articles
- Empirical Evidence of Socially-Engineered Attack Menace Among Undergraduate Smartphone Users in Selected Universities in Nigeria
- Deep Learning Network Anomaly-Based Intrusion Detection Ensemble For Predictive Intelligence To Curb Malicious Connections: An Empirical Evidence
- Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: Second Step Experiment
- Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: First Step Experiment
- Credit Card Fraud Detection using Imbalance Resampling Method with Feature Selection
Last modified: 2021-06-13 20:10:12