z-logo
open-access-imgOpen Access
Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery
Publication year - 2021
Publication title -
international journal of advanced trends in computer science and engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3091
DOI - 10.30534/ijatcse/2021/871032021
Subject(s) - computer science , vulnerability management , vulnerability (computing) , computer security , software , data science , vulnerability assessment , data mining , artificial intelligence , psychology , psychological resilience , psychotherapist , programming language
Today’s age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. In the field of computer security, vulnerability is a fault that might be exploited as a risk artist that performs unlawful activities inside computer security. The attackers have several different fitting tools and they are taking advantage to operate software illegally and are using it for getting self-profit. Additionally, that helps to expose and identify the violence external. Weakness management remains a repeating exercise to identify, remediating, and justifying weaknesses. These exercises normally send software faults in computing security. The meaning of using weakness with the same risk might go to misperception. It is possible to have a major effect because of possible stability and the window of weakness presented a risk hole in the software and required to fruitfully finish and smoothly operate. A security room has to be set up (zero-day invaders). Software Security Faults stand serious among unavoidable complications in the realm of computer risk. In this study, we have provided a comprehensive review of three book chapters, more than a hundred research articles papers, and several associated papers of different work that have been studied within the capacity of SVA and discovery applying ML and data-mining techniques. The earlier work has been thoroughly read and an adequately comprehensive summary has been provided in table-1. ML techniques that can professionally handle these attacks and we expect the net result of this survey article to help indesigning the new detection model for identifying the above-mentioned attacks

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here