Title: A mining approach for component abnormal information based on monitor log

Authors: Jinfu Chen; Lili Zhu; Yuchi Guo; Saihua Cai; Xiaolei Zhao

Addresses: School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 202000, China ' School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 202000, China ' School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 202000, China ' School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 202000, China ' School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, 202000, China

Abstract: A software component is an assembly unit that can be deployed independently in any software system. Since the source code and development documents of software components cannot be obtained, the vulnerability testing for software components is a challenge for component users. Explicit and implicit vulnerabilities are two common security vulnerabilities in the components. In this paper, in order to detect security vulnerabilities in the component under test effectively, a mining approach for component abnormal information based on monitor log is proposed. For explicit vulnerability, the monitor log is mined with the improved apriori algorithm, and the risk coefficient of each method in component is calculated with the frequent item sets algorithm based on the mining results. For implicit vulnerability, all the method execution sequences in monitor log should be extracted and stored into a database to establish the method sequence database. The vulnerability testing report will be obtained by mining the method sequence database with the improved generalised sequential patterns (GSP) algorithm after data preprocessing. An empirical study based on the proposed method is conducted, and the experimental results show that the approach to mine component abnormal information can effectively detect security exceptions of the component under test.

Keywords: component testing; explicit vulnerability; implicit vulnerability; apriori algorithm; GSP algorithm; software components; data mining; abnormal information; monitor logs; security vulnerabilities; software security; frequent item sets; generalised sequential patterns.

DOI: 10.1504/IJSPM.2016.079196

International Journal of Simulation and Process Modelling, 2016 Vol.11 No.5, pp.353 - 362

Received: 19 Nov 2015
Accepted: 05 Apr 2016

Published online: 22 Sep 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article