
Empirical studies on the impact of filter‐based ranking feature selection on security vulnerability prediction
Author(s) -
Chen Xiang,
Yuan Zhidan,
Cui Zhanqi,
Zhang Dun,
Ju Xiaolin
Publication year - 2021
Publication title -
iet software
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.305
H-Index - 43
eISSN - 1751-8814
pISSN - 1751-8806
DOI - 10.1049/sfw2.12006
Subject(s) - feature selection , vulnerability (computing) , ranking (information retrieval) , computer science , selection (genetic algorithm) , filter (signal processing) , feature (linguistics) , data mining , empirical research , artificial intelligence , vulnerability assessment , machine learning , statistics , computer security , mathematics , computer vision , psychology , linguistics , philosophy , psychological resilience , psychotherapist
Security vulnerability prediction (SVP) can construct models to identify potentially vulnerable program modules via machine learning. Two kinds of features from different points of view are used to measure the extracted modules in previous studies. One kind considers traditional software metrics as features, and the other kind uses text mining to extract term vectors as features. Therefore, gathered SVP data sets often have numerous features and result in the curse of dimensionality. In this article, we mainly investigate the impact of filter‐based ranking feature selection (FRFS) methods on SVP, since other types of feature selection methods have too much computational cost. In empirical studies, we first consider three real‐world large‐scale web applications. Then we consider seven methods from three FRFS categories for FRFS and use a random forest classifier to construct SVP models. Final results show that given the similar code inspection cost, using FRFS can improve the performance of SVP when compared with state‐of‐the‐art baselines. Moreover, we use McNemar's test to perform diversity analysis on identified vulnerable modules by using different FRFS methods, and we are surprised to find that almost all the FRFS methods can identify similar vulnerable modules via diversity analysis.