Volume 8 Number 8 (Aug. 2013)
Home > Archive > 2013 > Volume 8 Number 8 (Aug. 2013) >
JSW 2013 Vol.8(8): 1809-1817 ISSN: 1796-217X
doi: 10.4304/jsw.8.8.1809-1817

Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining

Qunhui Wu1, Shilong Ma1, Hao Wang2

1State Key Lab of Software Development Environment, Beijing University of Aeronautics and Astronautics, Beijing, P.R.China
2NARI Group Corporation, State Grid Electric Power Research Institute, Beijing, P.R.China


Abstract—Feature Extraction is significant for determining security vulnerabilities in software. Mining closed sequential patterns provides complete and condensed information for non-redundant frequent sequences generation. In this paper, we discuss the feature interaction problem and propose an efficient algorithm to extract features in vulnerability sequences. Each closed sequential pattern represents a feature in software vulnerabilities. We explore how to efficiently maintain closed sequential patterns in vulnerability sequences. A compact structure WClosedTree is designed to keep closed sequential patterns, and its nice properties are carefully studied. Two main pruning strategies, backwards super pattern condition and equivalent position information condition, are developed to remove frequent but non-closed sequential patterns in WClosedTree. During the process of maintaining WClosedTree, the weight metric of each feature sequence is calculated to better meet the needs of decision makers. Thus, the proposed algorithm can efficiently extract features from vulnerability sequences. The experimental results show that the proposed algorithm significantly improves the runtime efficiency for mining closed sequential patterns, and the feature interaction framework implements feature extraction in software vulnerabilities.

Index Terms—Feature extraction, closed sequential pattern, vulnerability sequence, software vulnerability.

[PDF]

Cite: Qunhui Wu, Shilong Ma, Hao Wang, "Extracting Feature Sequences in Software Vulnerabilities Based on Closed Sequential Pattern Mining," Journal of Software vol. 8, no. 8, pp. 1809-1817, 2013.

General Information

ISSN: 1796-217X (Online)
Frequency:  Quarterly
Editor-in-Chief: Prof. Antanas Verikas
Executive Editor: Ms. Yoyo Y. Zhou
Abstracting/ Indexing: DBLP, EBSCO, CNKIGoogle Scholar, ProQuest, INSPEC(IET), ULRICH's Periodicals Directory, WorldCat, etc
E-mail: jsweditorialoffice@gmail.com
  • Mar 01, 2024 News!

    Vol 19, No 1 has been published with online version    [Click]

  • Apr 26, 2021 News!

    Vol 14, No 4- Vol 14, No 12 has been indexed by IET-(Inspec)     [Click]

  • Nov 18, 2021 News!

    Papers published in JSW Vol 16, No 1- Vol 16, No 6 have been indexed by DBLP   [Click]

  • Jan 04, 2024 News!

    JSW will adopt Article-by-Article Work Flow

  • Nov 02, 2023 News!

    Vol 18, No 4 has been published with online version   [Click]