Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
In recent years, a proliferation of cyber-security threats and diversity has been on the rise culminating in an increase in their reporting and analysis. To counter that, many non-profit organizations have emerged in this domain, such as MITRE and OSWAP, which have been actively tracking vulnerabili...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In recent years, a proliferation of cyber-security threats and diversity has
been on the rise culminating in an increase in their reporting and analysis. To
counter that, many non-profit organizations have emerged in this domain, such
as MITRE and OSWAP, which have been actively tracking vulnerabilities, and
publishing defense recommendations in standardized formats. As producing data
in such formats manually is very time-consuming, there have been some proposals
to automate the process. Unfortunately, a major obstacle to adopting supervised
machine learning for this problem has been the lack of publicly available
specialized datasets. Here, we aim to bridge this gap. In particular, we focus
on mapping CVE records into MITRE CWE Weaknesses, and we release to the
research community a manually annotated dataset of 4,012 records for this task.
With a human-in-the-loop framework in mind, we approach the problem as a
ranking task and aim to incorporate reinforced learning to make use of the
human feedback in future work. Our experimental results using fine-tuned deep
learning models, namely Sentence-BERT and rankT5, show sizable performance
gains over BM25, BERT, and RoBERTa, which demonstrates the need for an
architecture capable of good semantic understanding for this task. |
---|---|
DOI: | 10.48550/arxiv.2304.11130 |