Abstract
With the increasing number of software vulnerabilities being disclosed each year, prioritizing them becomes essential as it is challenging to patch all of them promptly. Exploitability prediction plays a crucial role in assessing the severity of vulnerabilities and determining their prioritization. Most existing works on exploitability prediction focus on building predictive models based on features extracted from individual vulnerabilities, neglecting the relationships between vulnerabilities and their contextual information. Only a few studies have explored using homogeneous graph-based techniques to enhance performance in this domain. This paper proposes a novel heterogeneous graph-driven framework for enhancing vulnerability exploitability prediction. The framework comprises two heterogeneous graph feature extraction technique streams: topological feature concatenation and node embedding based on heterogeneous graph neural networks (HGNN). Experimental results demonstrate that both streams, leveraging heterogeneous graph-based features, significantly improve the performance of exploitability prediction compared with using features extracted from individual vulnerabilities. Specifically, the two streams achieve 5.44% and 2.06% improvement in the F1 score, respectively. The data and codes are available on GitHub (https://github.com/happyResearcher/HG-VEP) to facilitate reproducibility and further research in this field.
The work reported in this paper was partly supported by the Australian Research Council (ARC) Linkage Project LP180101062.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
References
Bozorgi, M., Saul, L.K., Savage, S., Voelker, G.M.: Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 105–114. ACM (2010)
Chen, Y., Han, S., Chen, G., Yin, J., Wang, K.N., Cao, J.: A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services. Health Inf. Sci. Syst. 11(1), 8 (2023). https://doi.org/10.1007/s13755-023-00212-3
Cheng, K., et al.: Secure \( k \)k-NN query on encrypted cloud data with multiple keys. IEEE Trans. Big Data 7(4), 689–702 (2017)
Dempsey, K., Takamura, E., Eavy, P., Moore, G.: Automation support for security control assessments: software vulnerability management. Technical report, National Institute of Standards and Technology (2020)
Fatima, M., Rehman, O., Rahman, I.M.: Impact of features reduction on machine learning based intrusion detection systems. EAI Endorsed Trans. Scalable Inf. Syst. 9(6), e9 (2022)
Ge, Y.F., Cao, J., Wang, H., Chen, Z., Zhang, Y.: Set-based adaptive distributed differential evolution for anonymity-driven database fragmentation. Data Sci. Eng. 6(4), 380–391 (2021). https://doi.org/10.1007/s41019-021-00170-4
Ge, Y.F., Orlowska, M., Cao, J., Wang, H., Zhang, Y.: MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. 31(5), 957–975 (2022). https://doi.org/10.1007/s00778-021-00718-w
Ge, Y.F., Wang, H., Cao, J., Zhang, Y.: An information-driven genetic algorithm for privacy-preserving data publishing. In: Chbeir, R., Huang, H., Silvestri, F., Manolopoulos, Y., Zhang, Y. (eds.) WISE 2022. LNCS, vol. 13724, pp. 340–354. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-20891-1_24
Hong, W., et al.: Graph intelligence enhanced bi-channel insider threat detection. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds.) NSS 2022. LNCS, vol. 13787, pp. 86–102. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-23020-2_5
Hong, W., et al.: A graph empowered insider threat detection framework based on daily activities. ISA Trans. (2023, in press). https://doi.org/10.1016/j.isatra.2023.06.030
Kong, L., Wang, L., Gong, W., Yan, C., Duan, Y., Qi, L.: LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web 25, 1793–1808 (2022). https://doi.org/10.1007/s11280-021-00941-z
Patil, D.R., Pattewar, T.M.: Majority voting and feature selection based network intrusion detection system. EAI Endorsed Trans. Scalable Inf. Syst. 9(6), e6 (2022)
Qin, S., Chow, K.P.: Automatic analysis and reasoning based on vulnerability knowledge graph. In: Ning, H. (ed.) CyberDI/CyberLife -2019. CCIS, vol. 1137, pp. 3–19. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-1922-2_1
Sarki, R., Ahmed, K., Wang, H., Zhang, Y., Wang, K.: Convolutional neural network for multi-class classification of diabetic eye disease. EAI Endorsed Trans. Scalable Inf. Syst. 9(4), e5 (2022)
Shalini, R., Manoharan, R.: Trust model for effective consensus in blockchain. EAI Endorsed Trans. Scalable Inf. Syst. 9(5), 1–8 (2022). https://doi.org/10.4108/eai.1-2-2022.173294
Han, S., Chen, Y., Chen, G., Yin, J., Wang, H., Cao, J.: Multi-step reinforcement learning-based offloading for vehicle edge computing. In: 2023 15th International Conference on Advanced Computational Intelligence (ICACI), pp. 1–8. IEEE (2023)
Singh, R., et al.: Antisocial behavior identification from twitter feeds using traditional machine learning algorithms and deep learning. EAI Endorsed Trans. Scalable Inf. Syst. 10(4), e17 (2023)
Suciu, O., Nelson, C., Lyu, Z., Bao, T., Dumitraş, T.: Expected exploitability: predicting the development of functional vulnerability exploits. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 377–394 (2022)
Sun, X., Wang, H., Li, J.: Injecting purpose and trust into data anonymisation. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, pp. 1541–1544 (2009)
Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422–437 (2012)
Sun, Y., Lin, D., Song, H., Yan, M., Cao, L.: A method to construct vulnerability knowledge graph based on heterogeneous data. In: 2020 16th International Conference on Mobility, Sensing and Networking (MSN), pp. 740–745. IEEE (2020)
Venkateswaran, N., Prabaharan, S.P.: An efficient neuro deep learning intrusion detection system for mobile adhoc networks. EAI Endorsed Trans. Scalable Inf. Syst. 9(6), e7 (2022)
Vimalachandran, P., Liu, H., Lin, Y., Ji, K., Wang, H., Zhang, Y.: Improving accessibility of the Australian my health records while preserving privacy and security of the system. Health Inf. Sci. Syst. 8, 1–9 (2020). https://doi.org/10.1007/s13755-020-00126-4
Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28(3), 600–615 (2014). https://doi.org/10.1002/cpe.3286
Wang, W., Wang, W., Yin, J.: A bilateral filtering based ringing elimination approach for motion-blurred restoration image. Curr. Opt. Photonics 4(3), 200–209 (2020)
Wang, Y., Zhou, Y., Zou, X., Miao, Q., Wang, W.: The analysis method of security vulnerability based on the knowledge graph. In: 2020 The 10th International Conference on Communication and Network Security, pp. 135–145 (2020)
Yang, Y., Guan, Z., Li, J., Zhao, W., Cui, J., Wang, Q.: Interpretable and efficient heterogeneous graph convolutional network. IEEE Trans. Knowl. Data Eng. 35(2), 1637–1650 (2023)
Yin, J., Tang, M.J., Cao, J., Wang, H., You, M., Lin, Y.: Adaptive online learning for vulnerability exploitation time prediction. In: Huang, Z., Beek, W., Wang, H., Zhou, R., Zhang, Y. (eds.) WISE 2020. LNCS, vol. 12343, pp. 252–266. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-62008-0_18
Yin, J., Tang, M., Cao, J., Wang, H., You, M., Lin, Y.: Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25, 401–423 (2022). https://doi.org/10.1007/s11280-021-00909-z
Yin, J., Tang, M., Cao, J., You, M., Wang, H.: Cybersecurity applications in software: data-driven software vulnerability assessment and management. In: Daimi, K., Alsadoon, A., Peoples, C., El Madhoun, N. (eds.) Emerging Trends in Cybersecurity Applications, pp. 371–389. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-09640-2_17
Yin, J., Tang, M., Cao, J., You, M., Wang, H., Alazab, M.: Knowledge-driven cybersecurity intelligence: software vulnerability co-exploitation behavior discovery. IEEE Trans. Ind. Inform. 19(4), 5593–5601 (2023)
You, M., Yin, J., Wang, H., Cao, J., Miao, Y.: A minority class boosted framework for adaptive access control decision-making. In: Zhang, W., Zou, L., Maamar, Z., Chen, L. (eds.) WISE 2021. LNCS, vol. 13080, pp. 143–157. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90888-1_12
You, M., et al.: A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26(2), 827–848 (2023). https://doi.org/10.1007/s11280-022-01076-5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yin, J., Chen, G., Hong, W., Wang, H., Cao, J., Miao, Y. (2023). Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction. In: Zhang, F., Wang, H., Barhamgi, M., Chen, L., Zhou, R. (eds) Web Information Systems Engineering – WISE 2023. WISE 2023. Lecture Notes in Computer Science, vol 14306. Springer, Singapore. https://doi.org/10.1007/978-981-99-7254-8_23
Download citation
DOI: https://doi.org/10.1007/978-981-99-7254-8_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7253-1
Online ISBN: 978-981-99-7254-8
eBook Packages: Computer ScienceComputer Science (R0)