Machine Learning-Based Security Pattern Recognition Techniques for Code Developers
نویسندگان
چکیده
Software developers represent the bastion of application security against overwhelming cyber-attacks which target all organizations and affect their resilience. As weaknesses may be introduced during process code writing are complex matching different variate skills, most applications launched intrinsically vulnerable. We have advanced our research for a scanner able to use automated learning techniques based on machine algorithms recognize patterns in source code. To make independent programming language, is converted vectorial representation using natural language processing methods, retain semantical traits original at same time reduce dependency lexical structure program. The flaws detection performance ranges accepted by software professionals (recall > 0.94) even when vulnerable samples very low represented dataset (e.g., less than 4% specific CWE dataset). No significant change or adaptation needed under scrutiny. apply this approach detecting Common Weaknesses Enumeration (CWE) vulnerabilities datasets provided NIST (Test suites–NIST Assurance Reference Dataset).
منابع مشابه
IoT Security Techniques Based on Machine Learning
Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...
متن کاملPersonality Recognition Applying Machine Learning Techniques on Source Code Metrics
Source code has become a data source of interest in the recent years. In the software industry is common the extraction of source code metrics, mainly for quality assurance purposes. In this paper source code metrics are used to consolidate programmers profiles with the purpose to identify different personality traits using machine learning algorithms. This work was done as part of the Personal...
متن کاملMachine Learning Pattern Recognition
Introduction These lecture notes were written to provide you with a handy reference to the material that was presented in the Machine Learning: Pattern Recognition course. It is not meant to replace the book of the course [Bishop, 2007], rather, it is meant to illustrate topics that may seem a bit dry or emphasise subjects that are deemed important to this class. It will often repeat what was s...
متن کاملMachine learning based Visual Evoked Potential (VEP) Signals Recognition
Introduction: Visual evoked potentials contain certain diagnostic information which have proved to be of importance in the visual systems functional integrity. Due to substantial decrease of amplitude in extra macular stimulation in commonly used pattern VEPs, differentiating normal and abnormal signals can prove to be quite an obstacle. Due to developments of use of machine l...
متن کاملGenetic-based machine learning systems are competitive for pattern recognition
During the last decade, research on GeneticBased Machine Learning has resulted in several proposals of supervised learning methodologies that use evolutionary algorithms to evolve rule-based classification models. Usually, these new GBML approaches are accompanied by little experimentation and there is a lack of comparisons among different proposals. Besides, the competitiveness of GBML systems...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app122312463