Method for prewarning aggression based on software defect and network aggression relation excavation

A network attack and software defect technology, applied in the direction of electrical components, transmission systems, digital transmission systems, etc., can solve the problems that software developers cannot provide constructive software defect repair opinions, difficult software security quality, and cannot fully respond to network attacks, etc.

Inactive Publication Date: 2011-04-06
XI AN JIAOTONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, the above two types of methods all play an important role in ensuring software security. However, the code-based software defect and vulnerability detection methods mainly detect software source programs and do not care about the impact of environmental variables. The analysis results cannot be comprehensive. To deal with real network attacks; while the intrusion detection method based on the attack mode can only detect the type of intrusion attack, but cannot provide software developers with constructive suggestions for repairing software defects, and it is difficult to substantially improve the quality of software security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for prewarning aggression based on software defect and network aggression relation excavation
  • Method for prewarning aggression based on software defect and network aggression relation excavation
  • Method for prewarning aggression based on software defect and network aggression relation excavation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] see figure 1 , according to the technical solution of the present invention, the system at least includes: a defect detection subsystem; a characteristic defect sequence library subsystem, which uses a defect implantation method to mine attack patterns associated with defect types through simulated attack experiments; an attack early warning judgment subsystem, Match the scanned defect types with the records in the characteristic defect sequence library, and output the successfully matched defect types and potential attack modes. Among them, the feature defect sequence library subsystem is connected with the attack early warning and judgment subsystem, and the defect detection subsystem is connected with the attack early warning and judgment subsystem.

[0029] refer to figure 2 , at first carry out step 101, the number of known software defect loopholes is M at present, and all loopholes form an initial set, and the number of commonly used network attack methods is N...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for prewarning an attack based on digging a relationship of software vulnerability and network attack. The method comprises a vulnerability detection sub-system, a feature vulnerability sequence bank sub-system and an attack prewarning determination sub-system, wherein the vulnerability detection sub-system carries out static analysis and detection rule-based software vulnerability; the feature vulnerability sequence bank sub-system digs and records the relationship between the software vulnerability and the network attack by vulnerability implant technology; and the attack prewarning determination sub-system matches a detected vulnerability defect of target software with records in the feature vulnerability sequence bank, and sends out an attack prewarningreport.

Description

technical field [0001] The invention belongs to the field of software vulnerability detection and network security, and specifically designs an attack early warning method based on software defect and network attack relationship mining. Background technique [0002] With the continuous development of the software industry, software defects and loopholes have gradually attracted the attention of the industry, especially with the popularization and vigorous development of the Internet, there have been a large number of hacker attacks and security issues, which have affected the security quality of network applications and software. a severe test. At present, there are mainly two technical methods to provide software security assurance. One is a code-based software defect and vulnerability detection method, and the other is an attack pattern-based intrusion detection method. [0003] Code-based software defect and vulnerability detection methods have been widely used in the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/02H04L9/36G06F21/55
Inventor 宋擒豹田若思赵龙
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products