Sequence pattern software security vulnerability-based detection method
A software security, sequential mode technology, applied in the field of information security, can solve the problems of single detection method, inability to balance detection speed and detection accuracy, and achieve the effect of ensuring detection accuracy, improving speed, and improving accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] A detection method based on sequence pattern software security loopholes is characterized in that comprising the following steps:
[0022] A. Store the known security vulnerability records in the database, classify the security vulnerability records in the database, and form several security vulnerability sequences;
[0023] B. Extract the feature vector of each security vulnerability sequence as the mark of each security vulnerability sequence;
[0024] C. Set up an online monitoring module and an offline scanning module in the software system. The online monitoring module compares the running program statement with the feature vector in step B, and the offline scanning module compares the source code of the software system with the security hole sequence in step A For comparison; while the online monitoring module compares the running program statements, it monitors the number of program statements running per unit time. When the number exceeds the set threshold, the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com