Vulnerability classification method, device and equipment

A classification method and vulnerability technology, applied in the computer field, can solve problems such as poor classification effect and poor applicability of vulnerability classification models, and achieve the effect of increasing the order of magnitude, ensuring universality and classification effect

Inactive Publication Date: 2019-11-26
HANGZHOU HIKVISION DIGITAL TECH
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of this application is to provide a vulnerability classification method to solve the problems of poor applicability and poor classification effect of the vulnerability classification model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability classification method, device and equipment
  • Vulnerability classification method, device and equipment
  • Vulnerability classification method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0025] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0026] figure 1 For a schematic flowchart of a vulnerability classification method provided by an embodiment of this specification, see figure 1 , the method may specifically include the following step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability classification method, device and equipment. The method comprises the following steps of: for multi-source heterogeneous vulnerability data, performing vectorization processing on the multi-source heterogeneous vulnerability data, fusing the multi-source heterogeneous vulnerability data with general vulnerability classification data to obtain a vulnerabilitykeyword vector set, and training a classification model by using vulnerability keyword vectors in the vulnerability keyword vector set. Visibly, the classification model is trained by using the multi-source heterogeneous vulnerability data, so that the classification effect and applicability of the classification model can be effectively improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a vulnerability classification method, device and equipment. Background technique [0002] With the continuous development of the Internet and information technology, software vulnerabilities pose an increasing threat to the security of information systems. Therefore, the objective demand for self-classification of vulnerabilities is becoming more and more intense. [0003] The current vulnerability self-classification scheme generally constructs the original database of vulnerability information by selecting a specific single vulnerability platform as a data source, and then uses the vulnerability data in the original database as samples for model training to obtain a vulnerability classification model, based on the vulnerability The classification model implements self-classification of vulnerabilities. However, due to the limited number of samples and single descr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/577G06F18/24G06F18/214
Inventor 周少鹏王滨万里毕志城
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products