Article ID: | iaor20163478 |
Volume: | 11 |
Issue: | 5 |
Start Page Number: | 353 |
End Page Number: | 362 |
Publication Date: | Sep 2016 |
Journal: | International Journal of Simulation and Process Modelling |
Authors: | Chen Jinfu, Zhu Lili, Guo Yuchi, Cai Saihua, Zhao Xiaolei |
Keywords: | simulation, datamining, security, computers, quality & reliability |
A software component is an assembly unit that can be deployed independently in any software system. Since the source code and development documents of software components cannot be obtained, the vulnerability testing for software components is a challenge for component users. Explicit and implicit vulnerabilities are two common security vulnerabilities in the components. In this paper, in order to detect security vulnerabilities in the component under test effectively, a mining approach for component abnormal information based on monitor log is proposed. For explicit vulnerability, the monitor log is mined with the improved apriori algorithm, and the risk coefficient of each method in component is calculated with the frequent item sets algorithm based on the mining results. For implicit vulnerability, all the method execution sequences in monitor log should be extracted and stored into a database to establish the method sequence database. The vulnerability testing report will be obtained by mining the method sequence database with the improved generalised sequential patterns (GSP) algorithm after data preprocessing. An empirical study based on the proposed method is conducted, and the experimental results show that the approach to mine component abnormal information can effectively detect security exceptions of the component under test.