An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.

Sensors (Basel)

Technopreneur-Ship Centre, School of Computer Science and Engineering and Director of the Nanyang, Nanyang Technological University (NTU), Singapore 639798, Singapore.

Published: June 2021

Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby there exists a severe class imbalance between the number of exploited and non-exploited vulnerabilities. The open source national vulnerability database, the largest repository to index and maintain all known vulnerabilities, assigns a unique identifier to each vulnerability. Each registered vulnerability also gets a severity score based on the impact it might inflict upon if compromised. Recent research works showed that the cvss score is not the only factor to select a vulnerability for exploitation, and other attributes in the national vulnerability database can be effectively utilized as predictive feature to predict the most exploitable vulnerabilities. Since cybersecurity management is highly resource savvy, organizations such as cloud systems will benefit when the most likely exploitable vulnerabilities that exist in their system software or hardware can be predicted with as much accuracy and reliability as possible, to best utilize the available resources to fix those first. Various existing research works have developed vulnerability exploitation prediction models by addressing the existing class imbalance based on algorithmic and artificial data resampling techniques but still suffer greatly from the overfitting problem to the major class rendering them practically unreliable. In this research, we have designed a novel cost function feature to address the existing class imbalance. We also have utilized the available large text corpus in the extracted dataset to develop a custom-trained word vector that can better capture the context of the local text data for utilization as an embedded layer in neural networks. Our developed vulnerability exploitation prediction models powered by a novel cost function and custom-trained word vector have achieved very high overall performance metrics for accuracy, precision, recall, F1-Score and AUC score with values of 0.92, 0.89, 0.98, 0.94 and 0.97, respectively, thereby outperforming any existing models while successfully overcoming the existing overfitting problem for class imbalance.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8235709PMC
http://dx.doi.org/10.3390/s21124220DOI Listing

Publication Analysis

Top Keywords

vulnerability exploitation
16
class imbalance
16
exploitation prediction
12
novel cost
12
cost function
12
word vector
12
national vulnerability
8
vulnerability database
8
exploitable vulnerabilities
8
developed vulnerability
8

Similar Publications

One hallmark of cancer is the upregulation and dependency on glucose metabolism to fuel macromolecule biosynthesis and rapid proliferation. Despite significant pre-clinical effort to exploit this pathway, additional mechanistic insights are necessary to prioritize the diversity of metabolic adaptations upon acute loss of glucose metabolism. Here, we investigated a potent small molecule inhibitor to Class I glucose transporters, KL-11743, using glycolytic leukemia cell lines and patient-based model systems.

View Article and Find Full Text PDF

Targeting aldehyde dehydrogenase ALDH3A1 increases ferroptosis vulnerability in squamous cancer.

Oncogene

January 2025

Institute of Health and Medical Technology, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei, 230031, China.

Ferroptosis is a unique modality of regulated cell death induced by excessive lipid peroxidation, playing a crucial role in tumor suppression and providing potential therapeutic strategy for cancer treatment. Here, we find that aldehyde dehydrogenase-ALDH3A1 tightly links to ferroptosis in squamous cell carcinomas (SCCs). Functional assays demonstrate the enzymatic activity-dependent regulation of ALDH3A1 in protecting SCC cells against ferroptosis through catalyzing aldehydes and mitigating lipid peroxidation.

View Article and Find Full Text PDF

Treatment options for viral infections are limited and viruses have proven adept at evolving resistance to many existing therapies, highlighting a significant vulnerability in our defenses. In response to this challenge, we explored the modulation of cellular RNA metabolic processes as an alternative paradigm to antiviral development. Previously, the small molecule 5342191 was identified as a potent inhibitor of HIV-1 replication by altering viral RNA accumulation at doses that minimally affect host gene expression.

View Article and Find Full Text PDF

The relatively high vulnerability of young Europeans in the labour market compared to other age groups has led many to seek alternative employment solutions, such as entrepreneurship. While not a comprehensive solution, entrepreneurial initiatives among youth can offer a valuable opportunity for their integration into stable and decent work. This research uses Flash Eurobarometer 513-Social Entrepreneurship and Youth to explore entrepreneurial intentions among European Union youth.

View Article and Find Full Text PDF

Background: The global rise in the elderly population brings attention to the pressing issue of elder abuse, categorized into physical, psychological, neglect, financial and sexual abuse. According to the World Health Organization (2022), one in six individuals aged 60 and older has experienced some form of abuse in community setting necessitating increase in awareness and support for older people. This study aimed to assess abuse and its associated factors among elderly population of Kamalamai Municipality of Sindhuli District, Nepal.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!