Software security flaw detection method based on sequential pattern mining

A sequential pattern mining and software security technology, applied in the field of information security, can solve problems such as low efficiency, insufficient vulnerability data collection, poor scalability and automation, and achieve the effect of improving detection efficiency and reducing the false negative rate of vulnerability detection.

Inactive Publication Date: 2010-05-19
BEIJING INSTITUTE OF TECHNOLOGYGY +2
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of the static analysis method are: ①It only focuses on the surface features of the program, which is too simple; ②Many static analysis tools need manual assistance to define types and rules to detect security vulnerabilities, their scalability and automation are poor, and the vulnerabilities that can be checked are limited.
Due to insufficient collection of vulnerability data, existing vulnerability detection tools have the disadvantages of high false negative rate and low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security flaw detection method based on sequential pattern mining
  • Software security flaw detection method based on sequential pattern mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solution of the present invention will be described in detail below in conjunction with specific embodiments.

[0052] The specific operation steps of the present invention are as follows:

[0053] Step 1. Use the existing security vulnerability data to create a security vulnerability sequence database.

[0054] Collect security vulnerability data detected by existing vulnerability detection tools, and create a software security vulnerability sequence database. The sequence database is represented by S, and contains the operation sequence corresponding to the confirmed security vulnerability. S is a tuple , Where SID is the sequence number of the vulnerability-related operation sequence; s is the vulnerability-related operation sequence, and the sequence s is denoted as 1 , E 2 , E 3 ,......,E i > , E i Represents an operation of the vulnerability; time represents the last access time of the vulnerability operation sequence.

[0055] Step 2: Preprocessing the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a software security flaw detection method based on sequential pattern mining. Firstly, a great quantity of relevant operation sequence data of a detected software security flaw is used for building a relevant operation sequence database of the security flaw; then, a closed sequential pattern mining arithmetic in the data mining is used to mine frequently appearing relevant operation sequence of the flaw; the mined frequently appearing relevant operation sequence of the flaw is used for detecting the security flaw of the current software system so as to lower flaw detection missing report rate as well as improve security flaw detection efficiency. Along with the accumulation of flaw data, the advantage of high security flaw detection efficiency of the invention is more outstanding.

Description

Technical field [0001] The invention relates to a software security vulnerability static detection technology, in particular to a software security vulnerability detection method based on sequence pattern mining, and belongs to the technical field of information security. Background technique [0002] With the rapid development of computer technology, the degree of informatization of human society is getting higher and higher, and the political, economic, military, cultural, and other fields of the entire society are becoming more and more dependent on computer information systems. Under this circumstance, the security of computer systems has attracted more and more attention. However, the writing of large-scale software and systems requires many programmers to complete the work. They divide a software or system into several sections, divide the work to write, then summarize, test; finally patch and release, so there are almost security vulnerabilities in the software. It is ine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F17/30G06F21/50
Inventor 胡昌振任家东王崑声马瑞青孟丽丽王立波张冬梅
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products