Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for analyzing characteristic of software vulnerability sequence based on cluster

A software vulnerability and sequence technology, applied in the field of information security, can solve the problems of difficulty in feature analysis, low efficiency of feature analysis of suspected vulnerability sequences, and cluster analysis of software vulnerability sequences.

Inactive Publication Date: 2010-06-16
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large number of software vulnerability sequence characteristics in the software vulnerability sequence database, it is difficult to analyze the characteristics of the suspected vulnerability sequences of the software under test. Therefore, the feature analysis efficiency of the suspected vulnerability sequence of the software under test is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analyzing characteristic of software vulnerability sequence based on cluster
  • Method for analyzing characteristic of software vulnerability sequence based on cluster
  • Method for analyzing characteristic of software vulnerability sequence based on cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solutions of the present invention will be described in detail below in conjunction with specific embodiments.

[0057] A schematic flow chart of a method for analyzing the sequence characteristics of software vulnerabilities based on clustering in the present invention is as follows: figure 1 As shown, the specific operation steps are as follows:

[0058] Step 1. Using the existing software vulnerability sequence data, create a software vulnerability sequence database, as shown in Table 1.

[0059] Table 1 Software Vulnerability Sequence Database

[0060] SID

S i

INF

CID

1

S 1 =ACBAA

sync error

C 1

2

S 2 =ABA

Installation parameter error

C 2

3

S 3 BCACCB

Boundary condition error

C 3

[0061] SID

S i

INF

CID

4

S 4 =CBCBCC

Access verification error

C 3

5

S 5 =CABCBCCB

source validation erro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for analyzing the characteristic of a software vulnerability sequence based on a cluster, which belongs to the technical field of information security. The method comprises the following steps: firstly, establishing a software vulnerability sequence database by using the conventional software vulnerability sequence; secondly, analyzing the software vulnerability sequence in the database by using clustering technology so as to generate a plurality of software vulnerability sequence clustering clusters; thirdly, finding the software vulnerability sequence clustering cluster which is most similar to a doubtful vulnerability sequence of software to be tested through similarity computation; fourthly, comparing the doubtful vulnerability sequence of the software to be tested with all software vulnerability sequences in the most similar software vulnerability sequence clustering cluster through a sequence comparison method, and further finding the software vulnerability sequence which is most similar to the doubtful vulnerability sequence of the software to be tested from the software vulnerability clustering cluster; and finally, outputting related vulnerability information, in the software vulnerability sequence database, corresponding to the most similar software vulnerability sequence as a security report. The method improves the analysis efficiency of the software vulnerability sequence.

Description

technical field [0001] The invention relates to a method for analyzing sequence characteristics of software vulnerabilities based on clustering, and belongs to the technical field of information security. Background technique [0002] With the increasing number of hacker attacks and the proliferation of worms on the Internet, information security has gradually become the focus of people's eyes. A core problem in information security is the software security loopholes in computer systems. Malicious attackers can use these security loopholes to elevate their privileges, access unauthorized resources, and even destroy sensitive data. The widespread application of computer software has brought more and more convenience to people and has increasingly affected people's daily life. However, there are a large number of errors and loopholes in computer software, which hide huge risks. The fundamental solution to prevent system attacks and intrusions is to discover, analyze and resea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 胡昌振任家东王崑声吴迪李立宁
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products