Vulnerability mining model construction method based on swarm intelligence

A technology of vulnerability mining and swarm intelligence, which is applied in the directions of instrument and platform integrity maintenance, electrical digital data processing, etc., can solve the problems of late start in the research of vulnerability mining and analysis technology, achieve fast and efficient search and solution capabilities, and reduce the cost of vulnerability mining , the effect of high concurrency

Active Publication Date: 2020-01-17
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Domestic research on vulnerability mining and analysis technology started relatively late, and our country’s research in the field of vulnerability mining still faces major challenges, and there are still many deficiencies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining model construction method based on swarm intelligence
  • Vulnerability mining model construction method based on swarm intelligence
  • Vulnerability mining model construction method based on swarm intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Among the present invention, the key technical problems to be solved are as follows:

[0023] (1) Vulnerability mining description method based on swarm intelligence

[0024] The core of swarm intelligence lies in the effective management and collaborative utilization of swarm intelligence resources in an open network environment to maximize swarm intelligence. The correct theoretical method is the basis for technological breakthroughs and application innovations. The swarm intelligence project for vulnerability mining is related to four factors, namely, the main body (human-machine) participating in vulnerability mining, the tools used for mining, the goals and tasks to be achieved by mining, and Dig into your physical and cyber environment. The main problem to be solved by the present invention is to generalize highly random and complex characteristics of cyberspace vulnerability mining subjects, tools, targets, and environments into a formalized process semantic cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability mining model construction method based on swarm intelligence. The vulnerability mining model construction method comprises the following steps: step 1, modelinga user individual; step 2, performing intelligent decomposition on a vulnerability mining task based on a vulnerability mining scene; 3, solving an optimal vulnerability mining path; and step 4, gathering and fusing crowd sourcing vulnerability mining results and establishing a feedback learning model. Compared with the prior art, the invention has the advantages that: the invention has positiveeffects; the model reflects crowd-sourcing concepts such as crowd collaboration, machine collaboration, computing resource collaboration and tool sharing; the method has the advantages of natural high-concurrency capability, rapid and efficient search and solution capability, extremely strong environmental adaptability, high robustness and self-recovery capability, strong expandability and high flexibility, the vulnerability mining efficiency is effectively improved, and the vulnerability mining cost is reduced.

Description

technical field [0001] The invention relates to a method for constructing a vulnerability mining model based on swarm intelligence. Background technique [0002] 1. Current status of swarm intelligence at home and abroad [0003] The intelligence of crowds emphasizes fully exploring everyone's wisdom to make the most accurate decisions. Swarm intelligence plays an important role in many disciplines, such as sociology, business, computer science, mass media and mass behavior. In the current computer field, the concept of swarm intelligence is very similar to Participatory Sensing, Social Sensing and Crowd-sourcing. They are all based on the participation of a large number of ordinary users, and their basic ideas are the same. That is to say, there are many people with great strength, and the wisdom of the group should be brought into play. Group intelligence refers to the interaction and collaboration of group intelligence resources composed of a large number of Internet u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1433
Inventor 饶志宏方恩博颜平陈剑锋
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products