Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability repairing method based on big data vulnerability mining and artificial intelligence mining system

Active Publication Date: 2021-11-23
浙江和仁科技股份有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Vulnerability repair solutions in related technologies cannot effectively refer to past vulnerability repair activities, and the perfection of vulnerability repair is slightly insufficient, which may affect the stability of business operation services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability repairing method based on big data vulnerability mining and artificial intelligence mining system
  • Vulnerability repairing method based on big data vulnerability mining and artificial intelligence mining system
  • Vulnerability repairing method based on big data vulnerability mining and artificial intelligence mining system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] figure 1 It is a schematic diagram of an application scenario of a vulnerability repair system 10 based on big data vulnerability mining provided by an embodiment of the present application. The vulnerability repair system 10 based on big data vulnerability mining may include an artificial intelligence mining system 100 and a cloud service system 200 communicating with the artificial intelligence mining system 100 . figure 1 The shown vulnerability repair system 10 based on big data vulnerability mining is only a feasible example, and in other feasible embodiments, the vulnerability repair system 10 based on big data vulnerability mining may also only include figure 1 At least some of the components shown may also include other components.

[0019] In an embodiment that can be based on an independent idea, the artificial intelligence mining system 100 and the cloud service system 200 in the vulnerability repair system 10 based on big data vulnerability mining can coope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a vulnerability repair method based on big data vulnerability mining and an artificial intelligence mining system. The method comprises the following steps: outputting vulnerability mining distribution based on a specified mining path, a vulnerability repairing reference vector set of a vulnerability repairing activity which corresponds to the target application software service and does not carry a target repairing category attribute, and a target output vulnerability mining distribution corresponding to the specified mining path, obtaining vulnerability repair component update information for the target application software service based on the vulnerability repair component update model, and then performing vulnerability repair for the target application software service through the updated vulnerability repair component based on the target output vulnerability mining distribution. In this way, vulnerability repair can be performed based on the vulnerability repair component adapted to the past vulnerability repair activity. In addition, the vulnerability repair also refers to target output vulnerability mining distribution in the specified mining path, so that the completeness of the vulnerability repair can be improved, and the stability of the business operation service is improved.

Description

technical field [0001] This application relates to the technical field of Internet service optimization, specifically, to a method for repairing vulnerabilities based on big data vulnerability mining and an artificial intelligence mining system. Background technique [0002] System Vulnerabilities (System Vulnerabilities) refers to the flaws or errors in the logic design of application software or operating system software, which are exploited by lawbreakers to attack or control the entire computer by implanting Trojan horses and viruses through the network, and steal important information in the computer. and information, and even destroy the system. Different types of software and hardware devices, different versions of the same device, different systems composed of different devices, and the same system under different setting conditions will have different security vulnerabilities. In related technologies, by analyzing software service vulnerability information, the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1433G06F2221/033
Inventor 杨馨姜虎
Owner 浙江和仁科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products