Network security vulnerability mining method and system based on artificial intelligence
A network security and vulnerability mining technology, applied in the field of information security, can solve problems such as poor use effect, and achieve the effect of improving speed and effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts are all related to the protection scope of the present invention.
[0052] like figure 1 As shown, the flow chart of the method for mining network security vulnerabilities in this embodiment includes:
[0053] Obtain multiple malicious file samples that have been successfully attacked;
[0054] Based on the deep learning method, a classification model is trained according to the attack behavior data of the malicious file samples, and the multiple malicious samples are classified;
[0055] According to the classification resul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


