Assessing Vulnerability from Its Description

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper shows an end-to-end Artificial Intelligence (AI) system to estimate the severity level and the various Common Vulnerability Scoring System (CVSS) components from natural language descriptions without reproducing the vulnerability. This natural language processing-based approach can estimate the CVSS from only the Common Vulnerabilities and Exposures description without the need to reproduce the vulnerability environment. We present an Error Grid Analysis for the CVSS base score prediction task. Experiments on CVSS 2.0 and CVSS 3.1 show that state-of-the-art deep learning models can predict the CVSS scoring components with high accuracy. The low-cost Universal Sentence Encoder (large) model outperforms the Generative Pre-trained Transformer-3 (GPT-3) and the Support Vector Machine baseline on the majority of the classification tasks with a lower computation overhead than the GPT-3.

Original languageEnglish
Title of host publicationUbiquitous Security - 2nd International Conference, UbiSec 2022, Revised Selected Papers
EditorsGuojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani
PublisherSpringer Science and Business Media Deutschland GmbH
Pages129-143
Number of pages15
ISBN (Print)9789819902712
DOIs
Publication statusPublished - 1 Jan 2023
Externally publishedYes
Event2nd International Conference on Ubiquitous Security, UbiSec 2022 - Zhangjiajie, China
Duration: 28 Dec 202231 Dec 2022

Publication series

NameCommunications in Computer and Information Science
Volume1768 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference2nd International Conference on Ubiquitous Security, UbiSec 2022
Country/TerritoryChina
CityZhangjiajie
Period28/12/2231/12/22

Keywords

  • Artificial Intelligence
  • CVSS
  • Deep Learning
  • Natural Language Processing
  • Threat Intelligence

Fingerprint

Dive into the research topics of 'Assessing Vulnerability from Its Description'. Together they form a unique fingerprint.

Cite this