Vulnerability detection method and device, electronic equipment and computer readable storage medium

A technology of vulnerability detection and the system under test, which is applied in the field of network security, can solve the problems of incompleteness and low accuracy of vulnerability detection, and achieve the effect of high accuracy and comprehensive vulnerability detection

Active Publication Date: 2020-08-11
NANKAI UNIV
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current research goals based on machine learning are relatively one-sided, and most of them focus on learning and analyzing vulnerability characteristics and vulnerability responses corresponding to vulnerability char...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium
  • Vulnerability detection method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0032] Application overview

[0033] With the wide application of Web systems in various business fields on the Internet, various Web security vulnerabilities have brought great security threats. It is a necessary measure to ensure the security of the Web system to determine whether there are loopholes in the Web system through testing. Currently, detection methods for web system vulnerabilities mainly include methods based on web crawlers, text mining methods, attack trees, attack graphs, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps: obtaining a script type label vector of a to-be-detected system through a first classifier according to a system feature vector of the to-be-detected system; obtaining structural data of script codes of the to-be-tested system througha second classifier according to the script category label vector of the to-be-tested system; and carrying out vulnerability detection based on the structure data of the script code of the to-be-detected system. Thus, high-accuracy and comprehensive vulnerability detection can be carried out in a continuously increasing and changing network environment.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a vulnerability detection method and device, electronic equipment, and a computer-readable storage medium. Background technique [0002] At present, there are a large number of web pages and vulnerability types in the network environment. Only relying on manual methods for attack tree modeling and vulnerability mining is far from meeting the detection requirements. Therefore, in recent years, the use of machine learning algorithms, such as support vector machines, hidden Markov models, decision trees, naive Bayesian, logistic regression, etc., can automatically update the test module to adapt to new vulnerabilities without spending manpower , which has obvious advantages in dealing with new types of vulnerabilities. However, the current research goals based on machine learning are relatively one-sided, and most of them focus on learning and analyzing vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F18/2411G06F18/24323
Inventor 许静邱宇刘云刘磊吴彦峰张建雯
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products