0% Complete
English
صفحه اصلی
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Robustness Gap in NLP Models for Vulnerability Descriptions: Benchmarking and Data Augmentation
نویسندگان :
AmirHossein Majd
1
Mahdi Yousefikia
2
Saghar Ghasemzadeh
3
Amirreza Asari
4
Arya Khoshnavataher
5
Seyedeh Leili Mirtaheri
6
1- University of Calabria
2- دانشگاه خوارزمی
3- دانشگاه خوارزمی
4- دانشگاه خوارزمی
5- دانشگاه خوارزمی
6- University of Calabria
کلمات کلیدی :
Software Vulnerabilities،Natural Language Processing،Robustness Benchmark،Noise Injection،Exploitability Prediction،Data Augmentation،Cybersecurity
چکیده :
Software vulnerability descriptions from CVE/NVD are the primary corpus for analysis, prioritization, and risk management in cybersecurity. Yet natural noise (typos, synonym substitutions, lexical variety) and adversarial perturbations undermine the accuracy and trustworthiness of NLP models. This paper presents, to our knowledge, the first systematic benchmark of NLP robustness on vulnerability descriptions. We train nine diverse architectures—lightweight transformers (MiniLM, MPNet, SBERT), hybrid models (BERT-LSTM, TextRCNN), and classical recurrent networks (BiLSTM, LSTM)—on a balanced dataset of over 56,000 real-world records from NVD and Exploit-DB, and fine-tune them for exploitability prediction. For comprehensive evaluation, we inject three noise families into test sets at levels from 10% to 80%: character-level edits (substitutions/swaps), synonym replacements using WordNet, and composite adversarial attacks generated with TextAttack. Performance declines across all models as noise rises, but vulnerability profiles differ: MiniLM attains the strongest clean-data score (F1 ≈ 0.933) yet is most brittle under character noise, whereas TextRCNN, despite a lower baseline, preserves comparatively higher stability in heavily perturbed conditions. Finally, we test a pragmatic hardening strategy—data augmentation with noisy variants followed by retraining—which consistently narrows robustness gaps across architectures without materially sacrificing clean-data accuracy. The benchmark and code enable reproducible evaluation and future robust modeling in cybersecurity.
لیست مقالات
لیست مقالات بایگانی شده
Video Steganography in HEVC Using Intra-Prediction Modes
Vahidreza Seirafian - Masoud Omomi
Prompt-Based Composed Fashion Image Retrieval via Gated Detail-Enhanced Dual Cross-Attention Difference Modeling
Kosar Keshavarz - Reza Azmi
ارائه مدل هشت مولفه ای استراتژی جامع هوش مصنوعی سازمانی
محمد کاظم صیادی - نیلوفر مرادحاصل - علیرضا یاری
3D Mesh ONoC: Design of low Insertion Loss and Non-blocking Optical Router and Efficient Routing Algorithm
Sanaz Asadinia - Elham Yaghoubi - Mostafa Sadeghi - Mahdi Mehrabi
Task Scheduling for Real-time Object Detection: Methods and Performance Comparison in ADAS Applications
Mahdi Seyfipoor - Sayyed Muhammad Jaffry - Siamak Mohamadi
پیشبینی بستری مجدد بیماران با استفاده از استخراج مفاهیم زیستپزشکی از متون بالینی
فهیمه شاهرخ شهرکی - رسول سامانی - دکتر ناصر قدیری فهیمه شاهرخ شهرکی - رسول سامانی - ناصر قدیری -
Improving Drug-Target Interaction Prediction Using Enhanced Feature Selection
Maryam Taheri - Mohammad Reza Keyvanpour - Mohadeseh Saadat Mousavi
A Novel Approach to Data mining algorithms and IoT based data mining machine learning
Danial Ramezani - Seyed Hossein Siadat
Web Service Ranking based on QoS and Use Prefer
Seyed Hossein Siadat - Danial Ramezani - Fatemeh Ahani
Using Trust Statements and Ratings by GraphSAGE to Alleviate Cold Start in Recommender Systems
Seyedeh Niusha Motevallian - Dr Seyed Mohammad Hossein Hasheminejad
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2