Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining

نویسندگان

  • Qunhui Wu
  • Shilong Ma
  • Hao Wang
چکیده

Feature Extraction is significant for determining security vulnerabilities in software. Mining closed sequential patterns provides complete and condensed information for non-redundant frequent sequences generation. In this paper, we discuss the feature interaction problem and propose an efficient algorithm to extract features in vulnerability sequences. Each closed sequential pattern represents a feature in software vulnerabilities. We explore how to efficiently maintain closed sequential patterns in vulnerability sequences. A compact structure WClosedTree is designed to keep closed sequential patterns, and its nice properties are carefully studied. Two main pruning strategies, backwards super pattern condition and equivalent position information condition, are developed to remove frequent but non-closed sequential patterns in WClosedTree. During the process of maintaining WClosedTree, the weight metric of each feature sequence is calculated to better meet the needs of decision makers. Thus, the proposed algorithm can efficiently extract features from vulnerability sequences. The experimental results show that the proposed algorithm significantly improves the runtime efficiency for mining closed sequential patterns, and the feature interaction framework implements feature extraction in software vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Empirical Study of Extracting Multidimensional Sequential Rules for Personalization and Recommendation in Online Commerce

The application of web mining to personalization has a long tradition in electronic commerce research. In this empirical study we focus specifically on mining sequential navigation patterns from weblogs and thoroughly compare different design variants for making personalized suggestions to users. In particular we concentrate on the impact of additional product knowledge like item characteristic...

متن کامل

A Framework for Mining Closed Sequential Patterns

Sequential pattern mining algorithms developed so far provide better performance for short sequences but are inefficient at mining long sequences, since long sequences generate a large number of frequent subsequences. To efficiently mine long sequences, closed sequential pattern mining algorithms have been developed. These algorithms mine closed sequential patterns which don’t have any super se...

متن کامل

CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining

Recently, frequent sequential pattern mining algorithms have been widely used in software engineering field to mine various source code or specification patterns. In practice, software evolves from one version to another in its life span. The effort of mining frequent sequential patterns across multiple versions of a software can be substantially reduced by efficient incremental mining. This pr...

متن کامل

High Fuzzy Utility Based Frequent Patterns Mining Approach for Mobile Web Services Sequences

Nowadays high fuzzy utility based pattern mining is an emerging topic in data mining. It refers to discover all patterns having a high utility meeting a user-specified minimum high utility threshold. It comprises extracting patterns which are highly accessed in mobile web service sequences. Different from the traditional fuzzy approach, high fuzzy utility mining considers not only counts of mob...

متن کامل

An Internet behavior management system based on Android

REGULAR PAPERS Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining Qunhui Wu, Shilong Ma, and Hao Wang The Complex Product Design Modeling Based on Spatial Sequence Colored Petri-nets Yongtao Hao, Peng Dai and Diming Lou Text Image with Complex Background Filtering Method Based on Harris Corner-point Detection Fanfeng Zeng, Guofeng Zhang, and Jin J...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013