Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • W Wiki Home
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 0
    • Issues 0
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Create a new issue
  • Jobs
  • Issue Boards
Collapse sidebar
  • VM4SEC Wiki
  • Wiki Home
  • Wiki
  • Vulnerability Prediction (VP)

Vulnerability Prediction (VP) · Changes

Page history
Update Vulnerability Prediction (VP) authored Mar 02, 2022 by Ilias's avatar Ilias
Hide whitespace changes
Inline Side-by-side
Vulnerability-Prediction-(VP).md
View page @ 584b7f0c
...@@ -97,7 +97,7 @@ Hence, the following HTTP GET Request needs to be submitted: ...@@ -97,7 +97,7 @@ Hence, the following HTTP GET Request needs to be submitted:
http://160.40.52.130:5002/DependabilityToolbox/VulnerabilityPrediction?project=https://github.com/siavvasm/HelloWorldJavaCompiled&lang=java http://160.40.52.130:5002/DependabilityToolbox/VulnerabilityPrediction?project=https://github.com/siavvasm/HelloWorldJavaCompiled&lang=java
``` ```
After submitting the request, the *Vulnerability Prediction* service is invoked and the selected project is analyzed. In brief, the service selects the Deep Learning Model for the specified programming language, and performs text mining in order to produce vectors with sequences of embedded tokens (i.e., words) for each one of the source code files of the project. Subsequently, these vectors are passed as input to the selected Deep Learning Model, which computes the likelihood of vulnerability and classifies the corresponding file as potentially vulnerble or clean/neutral. After the successful execution of the analysis, a JSON report with the results is produced and sent as a response to the user. The produced JSON for the *HelloWorldCompiled* project is presented below: After submitting the request, the *Vulnerability Prediction* service is invoked and the selected project is analyzed. In brief, the service selects the Deep Learning Model for the specified programming language, and performs text mining in order to produce vectors with sequences of embedded tokens (i.e., words) for each one of the source code files of the project. Subsequently, these vectors are passed as input to the selected Deep Learning Model, which computes the likelihood of vulnerability and classifies the corresponding file as potentially vulnerable or clean/neutral. After the successful execution of the analysis, a JSON report with the results is produced and sent as a response to the user. The produced JSON for the *HelloWorldCompiled* project is presented below:
``` ```
{ {
......
Clone repository
  • Project Management API
  • Quantitative Security Assessment (QSA)
  • VM4SEC Dashboard
  • Vulnerability Prediction (VP)
  • Walkthrough
  • Home