ThreatZoom: Hierarchical neural network for CVEs to CWEs classification

  • Ehsan Aghaei*
  • , Waseem Shadid
  • , Ehab Al-Shaer
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities. One or more CVEs are grouped into the Common Weakness Enumeration (CWE) classes for the purpose of understanding the software or configuration flaws and potential impacts enabled by these vulnerabilities and identifying means to detect or prevent exploitation. As the CVE-to-CWE classification is mostly performed manually by domain experts, thousands of critical and new CVEs remain unclassified, yet they are unpatchable. This significantly limits the utility of CVEs and slows down proactive threat mitigation tremendously. This paper presents ThreatZoom, as the first automatic tool to classify CVEs to CWEs. ThreatZoom uses a novel learning algorithm that employs an adaptive hierarchical neural network that adjusts its weights based on text analytic scores and classification errors. It automatically estimates the CWE classes corresponding to a CVE instance using both statistical and semantic features extracted from the description of a CVE. This tool is rigorously tested by various datasets provided by MITRE and the National Vulnerability Database (NVD). The accuracy of classifying CVE instances to their correct CWE classes is 92 % (fine-grain) and 94 % (coarse-grain) for NVD dataset, and 75 % (fine-grain) and 90 % (coarse-grain) for MITRE dataset, despite the small corpus.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings
EditorsNoseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
PublisherSpringer Science and Business Media Deutschland GmbH
Pages23-41
Number of pages19
ISBN (Print)9783030630850
DOIs
StatePublished - 2020
Externally publishedYes
Event16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020 - Washington, United States
Duration: 21 Oct 202023 Oct 2020

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume335
ISSN (Print)1867-8211

Conference

Conference16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020
Country/TerritoryUnited States
CityWashington
Period21/10/2023/10/20

Bibliographical note

Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020.

Keywords

  • CVE to CWE classification
  • Hierarchical neural network
  • Proactive cyber defense
  • Vulnerability analysis

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'ThreatZoom: Hierarchical neural network for CVEs to CWEs classification'. Together they form a unique fingerprint.

Cite this