Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method based on random detection algorithm and information aggregation

An information aggregation and vulnerability detection technology, applied in the field of vulnerability detection, can solve the problems of a large number of samples, affecting the accuracy and pertinence of vulnerability detection, and low efficiency of vulnerability detection models, so as to achieve the effect of rapid vulnerability detection and improved accuracy.

Pending Publication Date: 2021-01-22
厦门美域中央信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the existing vulnerability detection methods perform feature extraction, the number of samples is large and complex, resulting in low efficiency of the vulnerability detection model, which affects the accuracy and pertinence of vulnerability detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method based on random detection algorithm and information aggregation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0034] Such as figure 1 As shown, the present invention proposes a vulnerability detection method based on random detection algorithm and information aggregation, the method steps are as follows:

[0035] S1. Establish an information aggregation module to collect, filter, organize and integrate network data flow information in each module of the software, and obtain a collection of information composed of java / C++ codes;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability detection method based on a random detection algorithm and information aggregation. The method comprises the following steps: establishing an information set; decompiling; establishing a binary training set establishing a vulnerability detection model; judging abnormal points by the vulnerability detection model; bug handling. Network data flow information in each module of software is acquired, screened, organized and integrated for multiple times through the information aggregation module to obtain a high-purity binary training set, a vulnerability detection model is established by matching with the effects of a radial basis function neural network and a recurrent neural network, and through machine learning, the detection capability of the model on possible security vulnerabilities in binary software is continuously improved, and meanwhile, a random forest algorithm is adopted, so that the extraction accuracy of the function and the corresponding feature vector of the to-be-detected binary program is improved, and the purpose of rapid and accurate vulnerability detection is achieved.

Description

technical field [0001] The invention relates to the field of loophole detection, in particular to a loophole detection method based on a random detection algorithm and information aggregation. Background technique [0002] With the rapid development of computer information technology, cyberspace security is becoming more and more important, because the network incidents caused by software vulnerabilities are on the rise, which poses a great threat to cyberspace security. Vulnerability analysis technology has become a research hotspot in the field of network security. [0003] Vulnerability detection is an important branch of vulnerability analysis technology. Most of them start from existing vulnerabilities, find similar vulnerabilities that have a homologous relationship with them, and even discover undisclosed vulnerabilities based on the characteristics of vulnerability codes. However, when the existing vulnerability detection methods perform feature extraction, the numbe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F8/53G06N3/04G06N3/08
CPCG06F21/577G06F8/53G06N3/08G06N3/045Y02D30/50
Inventor 肖清林石小川张晶陈瑜靓赵昆杨黄靓陈鹭菲王榕腾杜鑫杨国林杨昆强刘健养
Owner 厦门美域中央信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products