Breaking News

How Microsoft Is Using Machine Learning To Secure Its Software Development Cycle – Analytics India Magazine

Tech giant Microsoft recently built a machine learning classification system which aims to secure the software development lifecycle. The machine learning system helps in classifying bugs as security or non-security and critical or non-critical. This provides a level of accuracy, akin to that provided by security experts.

The software developers at Microsoft address several issues and vulnerabilities. More than 45,000 developers generate nearly 30,000 bugs per month, which gets stored across 100+ AzureDevOps and GitHub repositories. The tech giant is looking to mitigate these vulnerabilities. 

Since 2001, the tech giant has collected 13 million work items and bugs. According to sources, Microsoft spends an estimated $150,000 per issue as a whole to mitigate bugs and vulnerabilities. 

However, according to the developers, since there are more than 45,000 developers already working to address the problem, applying more human resources to better label and prioritise the bugs is not possible. 

To build the machine learning model, the tech giant used 13 Million work items and bugs to train the model which they had collected for two decades. They stated, “We used that data to develop a process and machine learning model that correctly distinguishes between security and non-security bugs 99% of the time, and accurately identifies the critical, high priority security bugs 97% of the time.”

Behind The Classification System

As large volumes of semi-curated data are adequate for machine learning tasks, the data science and security teams at the tech giant came together to build the supervised machine learning system. Top Data Scientists for our Hackathons

In supervised learning, a machine learning model learns how to classify data from pre-labelled data. The ML developers at the tech giant fed the model with a large number of bugs, which are organised into labelled security, and others that are not labelled security. 

.u7f515ec400c8059da4216cec3347cc59 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u7f515ec400c8059da4216cec3347cc59:active, .u7f515ec400c8059da4216cec3347cc59:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u7f515ec400c8059da4216cec3347cc59 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u7f515ec400c8059da4216cec3347cc59 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u7f515ec400c8059da4216cec3347cc59 .postTitle { color:#000000; text-decoration: underline!important; font-size: 16px; } .u7f515ec400c8059da4216cec3347cc59:hover .postTitle { text-decoration: underline!important; } Also Read  Making The Best Of Both Worlds With Graph-Based Hyperparameter TuningTo make the machine learning classification system perform like a security expert, the training data was initially approved by the security experts before it was fed to the machine learning model.  

To build a machine learning model that yields maximum accuracy, the developers followed an approach in action, which includes five processes:

Data collection: For data collection, the developer identified all the data types and sources and evaluated its qualityData curation and approval: In this approach, the security expert reviewed the data and confirmed that the labels are correctModelling and evaluation: In this approach, a data modelling technique is selected, the model is trained, and the performance is evaluatedEvaluation of model in production: In this approach, the security experts evaluated the model in production by monitoring the average number of bugs and manually reviewing a random sampling of bugsAutomated re-training: The developers then conducted automated re-training to make sure that the bug modelling system keeps the right pace with the ever-evolving products at Microsoft

How It Works

The ML developers used statistical sampling to provide security experts with a manageable amount of data to review. To classify bugs accurately, they used a two-step machine learning model operation. 

The first step for the machine learning model is to learn how to classify security and non-security bugs. In the second step, the machine learning model applied severity labels such as critical, important, and low-impact to the security bugs.

Wrapping Up

Applying this machine learning classification system, the developers can now accurately classify which work items are security bugs 99% of the time. The model also shows 97% accuracy rate when it comes to labelling critical and non-critical security bugs. 

.u7a8614e8e89bfdf5bfc2d562d8cea065 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u7a8614e8e89bfdf5bfc2d562d8cea065:active, .u7a8614e8e89bfdf5bfc2d562d8cea065:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u7a8614e8e89bfdf5bfc2d562d8cea065 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u7a8614e8e89bfdf5bfc2d562d8cea065 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u7a8614e8e89bfdf5bfc2d562d8cea065 .postTitle { color:#000000; text-decoration: underline!important; font-size: 16px; } .u7a8614e8e89bfdf5bfc2d562d8cea065:hover .postTitle { text-decoration: underline!important; } Also Read  Top 7 Python Libraries Popular In The FinTech SectorThe developers stated, “This level of accuracy gives us the confidence that we are catching more security vulnerabilities before they are exploited.” They added, “In the coming months, we will open-source our methodology to GitHub.” 
Provide your comments below comments
Source: https://analyticsindiamag.com/how-microsoft-is-using-machine-learning-to-secure-its-software-development-cycle/