Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for prewarning aggression based on software defect and network aggression relation excavation

A network attack and software defect technology, applied in the direction of electrical components, transmission systems, digital transmission systems, etc., can solve the problems that software developers cannot provide constructive software defect repair opinions, difficult software security quality, and cannot fully respond to network attacks, etc.

Inactive Publication Date: 2009-05-27
XI AN JIAOTONG UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, the above two types of methods all play an important role in ensuring software security. However, the code-based software defect and vulnerability detection methods mainly detect software source programs and do not care about the impact of environmental variables. The analysis results cannot be comprehensive. To deal with real network attacks; while the intrusion detection method based on the attack mode can only detect the type of intrusion attack, but cannot provide software developers with constructive suggestions for repairing software defects, and it is difficult to substantially improve the quality of software security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for prewarning aggression based on software defect and network aggression relation excavation
  • Method for prewarning aggression based on software defect and network aggression relation excavation
  • Method for prewarning aggression based on software defect and network aggression relation excavation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] See figure 1 According to the technical solution of the present invention, the system at least includes: a defect detection subsystem; a characteristic defect sequence library subsystem, which adopts a defect implantation method to mine attack patterns associated with defect types through simulated attack experiments; an attack early warning and determination subsystem, Match the scanned defect types with the records in the characteristic defect sequence database, and output the successfully matched defect types and potential attack modes. Among them, the characteristic defect sequence library subsystem is connected to the attack early warning and judging subsystem, and the defect detection subsystem is connected to the attack early warning and judging subsystem.

[0027] Refer to figure 2 , First go to step 101, currently the number of known software defect vulnerabilities is M, all vulnerabilities constitute an initial set, the number of commonly used network attack met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for prewarning an attack based on digging a relationship of software vulnerability and network attack. The method comprises a vulnerability detection sub-system, a feature vulnerability sequence bank sub-system and an attack prewarning determination sub-system, wherein the vulnerability detection sub-system carries out static analysis and detection rule-based software vulnerability; the feature vulnerability sequence bank sub-system digs and records the relationship between the software vulnerability and the network attack by vulnerability implant technology; and the attack prewarning determination sub-system matches a detected vulnerability defect of target software with records in the feature vulnerability sequence bank, and sends out an attack prewarning report.

Description

Technical field [0001] The invention belongs to the field of software vulnerability detection and network security, and specifically designs an attack warning method based on software defect and network attack relationship mining. Background technique [0002] With the continuous development of the software industry, software defects and vulnerabilities have gradually attracted the attention of the industry. Especially with the popularization and vigorous development of the Internet, a large number of hacker attacks and security problems have appeared, which has affected the security quality of network applications and software. A severe test. At present, two technical methods are mainly adopted to provide software security assurance. One is the software defect and vulnerability detection method based on code, and the other is the intrusion detection method based on the attack mode. [0003] Code-based software defect and vulnerability detection methods have been widely used in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/36G06F21/02G06F21/55
Inventor 宋擒豹田若思赵龙
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products