Reference Hub4
Software Vulnerability Prediction Using Grey Wolf-Optimized Random Forest on the Unbalanced Data Sets

Software Vulnerability Prediction Using Grey Wolf-Optimized Random Forest on the Unbalanced Data Sets

Wasiur Rhmann
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 15
ISSN: 1947-8283|EISSN: 1947-8291|EISBN13: 9781799885405|DOI: 10.4018/IJAMC.292508
Cite Article Cite Article

MLA

Rhmann, Wasiur. "Software Vulnerability Prediction Using Grey Wolf-Optimized Random Forest on the Unbalanced Data Sets." IJAMC vol.13, no.1 2022: pp.1-15. http://doi.org/10.4018/IJAMC.292508

APA

Rhmann, W. (2022). Software Vulnerability Prediction Using Grey Wolf-Optimized Random Forest on the Unbalanced Data Sets. International Journal of Applied Metaheuristic Computing (IJAMC), 13(1), 1-15. http://doi.org/10.4018/IJAMC.292508

Chicago

Rhmann, Wasiur. "Software Vulnerability Prediction Using Grey Wolf-Optimized Random Forest on the Unbalanced Data Sets," International Journal of Applied Metaheuristic Computing (IJAMC) 13, no.1: 1-15. http://doi.org/10.4018/IJAMC.292508

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Any vulnerability in the software creates a software security threat and helps hackers to gain unauthorized access to resources. Vulnerability prediction models help software engineers to effectively allocate their resources to find any vulnerable class in the software, before its delivery to customers. Vulnerable classes must be carefully reviewed by security experts and tested to identify potential threats that may arise in the future. In the present work, a novel technique based on Grey wolf algorithm and Random forest is proposed for software vulnerability prediction. Grey wolf technique is a metaheuristic technique and it is used to select the best subset of features. The proposed technique is compared with other machine learning techniques. Experiments were performed on three datasets available publicly. It was observed that our proposed technique (GW-RF) outperformed all other techniques for software vulnerability prediction.