Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

31 results about "Vulnerability prediction" patented technology

Intelligent contract multi-vulnerability detection method and system based on source code graph representation learning

The invention discloses an intelligent contract multi-vulnerability detection method and system based on source code graph representation learning, and the method comprises the steps: carrying out representation of an intelligent contract source code through a function granularity code attribute graph in combination with an abstract syntax tree and semantic information of an intelligent contract; and according to grammatical features of different types of vulnerabilities of the intelligent contract, defining a slicing criterion, using a program slicing technology to carry out noise reduction on the intelligent contract graph representation, carrying out feature extraction in combination with a gated graph neural network, and carrying out vulnerability prediction based on the extracted features. The method has the advantages that the intelligent contract source code is represented by combining multiple graph structures, and grammar and semantic information and a context structure of the code are fully reserved; noise codes irrelevant to vulnerability detection are removed by using a program slicing technology, so that the detection accuracy is improved; the features of various vulnerabilities are automatically learned based on the gated graph neural network, the application range and the detection efficiency of vulnerability detection are improved, and the detection cost is reduced.
Owner:YANGZHOU UNIV

Seed optimization method based on vulnerability prediction model

The invention discloses a seed optimization method based on a vulnerability prediction model, and the method comprises the steps: building the vulnerability prediction model, enabling the vulnerability prediction model to be used for predicting the vulnerability of a function in a target program, achieving the seed optimization through the screening of seeds, and tracking the execution information of the target program through a dynamic binary detection method, and calculating a static vulnerability score SVS according to the vulnerability probability obtained by the vulnerability prediction model, and storing the test case with the score higher than a certain threshold in a seed input pool. The test cases are selected by using a seed selection strategy and stored in a seed input pool, and executed test cases capable of causing collapse are also stored in the seed input pool. Next generation inputs of the seed input pool are generated by mutating the inputs in the seed input pool. According to the method, the vulnerability prediction probability of the basic block of the target program is fully considered, effective variation aiming at the target program is favorably realized, the effectiveness of the test case is improved, and vulnerabilities are more easily mined.
Owner:NO 15 INST OF CHINA ELECTRONICS TECH GRP +2

Safety protection method and device for vehicle-mounted system

The invention discloses a safety protection method and device for a vehicle-mounted system. The method comprises the following steps: S1, generating a corresponding vehicle machine defense rule according to acquired vulnerability information and a defense strategy corresponding to the acquired vulnerability information; S2, issuing the vehicle machine defense rule to a vehicle machine terminal, sothat the vehicle machine terminal performs vulnerability defense according to the vehicle machine defense rule; S3, acquiring vulnerability information fed back by the vehicle-mounted terminal through self-attack detection, and generating a defense strategy corresponding to the fed-back vulnerability information, and further executing the step S1. According to the scheme, vulnerability prediction, defense of the predicted vulnerability, attack detection of the terminal and quick response to attack detection of the terminal can be realized; loophole prediction is provided for the other terminal according to loophole detection and response results of the terminal, circulation is carried out in sequence, and a complete protection ecological cycle for the vehicle-mounted system is formed, sothat safety protection of the vehicle-mounted system can be integrally realized in multiple directions, and an excellent protection effect is achieved.
Owner:BEIJING QIHOO TECH CO LTD

Power distribution network toughness improvement strategy based on environmental data prediction

The invention relates to a power distribution network toughness improvement strategy based on environmental data prediction. Comprehensive environment data prediction analysis is carried out on the operation condition of a power distribution network and vulnerable links of the power distribution network are predicted, so that the early warning capability of disaster risks is improved; a power distribution network vulnerability prediction model based on environmental data pre-judgment is established, and the fault rate prediction level is improved; a power distribution network fault bearing capacity evaluation method based on environmental data is provided, and a power distribution network fault bearing capacity evaluation method is provided; the influence of ice disaster on the toughness of a power distribution network is reflected by using the change of system performance, and a power distribution network toughness evaluation model is established; the invention aims at implementing planning and scheduling measures for improving the toughness of a power distribution network in a catastrophe defense stage and a post-disaster recovery stage, and further provides a power distribution network toughness improvement strategy under environmental data pre-judgment. According to the invention, the toughness of a power distribution network is comprehensively improved in a disaster process and a post-disaster process through coordination and cooperation of active defense before a fault occurs and fault recovery after disaster.
Owner:FUSHUN POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY +1

SDC vulnerability prediction method based on instruction feature importance

The invention discloses an SDC vulnerability prediction method based on instruction feature importance. The method comprises the following steps: performing instruction feature extraction on a complex program; random fault injection is carried out on the complex program, and an instruction SDC vulnerability value is obtained; measuring the importance degree of the instruction SDC vulnerability feature T to an SDC vulnerability value based on a Gini coefficient, and constructing an instruction feature importance evaluation coefficient; the instruction feature importance is fused into the discourse right of each sub-decision tree of LightGBM, and a new discourse right omega is generated to improve the prediction precision of the instruction SDC vulnerability. Based on an improved LightGBM algorithm, constructing and training an SDC vulnerability prediction model based on instruction feature importance; and performing instruction SDC vulnerability prediction on the to-be-predicted program by the obtained final SDC vulnerability prediction model. Compared with other methods, the method has higher vulnerability prediction precision, can effectively reduce memory consumption and calculation cost, can be applied to standard data types and mixed data types, and has the advantages of light weight, high interpretation and the like.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

A system for predicting industrial control network vulnerabilities based on Internet and industrial control network vulnerability parameters

The present invention relates to a system for predicting the vulnerability of the industrial control network based on the Internet and the vulnerability parameters of the industrial control network, realizing step S101, obtaining the training period T of the training data set 0 =LCM(TP m ); step S102, obtaining from the database the distance T before the current moment corresponding to each sample vulnerability id 0 Inner P m A list of parameter values ​​for , Q n Parameter value list and industrial control network vulnerability outbreak probability true value; Step S103, determine P m The training parameter value PC m and Q n The training parameter value QC n , PC-based m and QC n Generate the model input vector of each sample vulnerability id; step S104, obtain the industrial control network vulnerability prediction model according to all sample vulnerability id model input vectors and the true value training of the industrial control network vulnerability outbreak probability; step S105, predict based on the industrial control network vulnerability prediction model Explosion probability of industrial control network vulnerabilities. The invention can quickly and accurately predict the outbreak probability of loopholes in the industrial control network and improve the security of the industrial control network.
Owner:山东云天安全技术有限公司

System for predicting industrial control network vulnerabilities based on correction parameters

The invention relates to a system for predicting industrial control network vulnerabilities based on correction parameters, which is implemented by the following steps: S201, acquiring a parameter value list of Pm corresponding to each sample vulnerability id in a preset training period, an internet vulnerability actual outbreak probability list, an industrial control network vulnerability actual outbreak probability list and an industrial control network vulnerability outbreak probability true value from a database; s202, determining a correction parameter PCVE corresponding to each sample vulnerability id, determining a corresponding training parameter value PCm, and generating a model input vector of each sample vulnerability id based on the PCm; s203, training to obtain an industrial control network vulnerability prediction model according to the correction parameters PCVE corresponding to all the sample vulnerability id, the model input vector and the industrial control network vulnerability burst probability true value; and S204, predicting an industrial control network vulnerability outbreak probability based on the industrial control network vulnerability prediction model. According to the invention, the vulnerability outbreak probability of the industrial control network can be quickly and accurately predicted, and the safety of the industrial control network is improved.
Owner:山东云天安全技术有限公司

System for predicting industrial control network vulnerability based on N-gram

The invention relates to a system for predicting industrial control network vulnerabilities based on N-gram, which is implemented by the following steps: S601, removing industrial Internet stop words in Sore based on an industrial Internet stop word bank, and segmenting the Sore at the positions of the industrial Internet stop words to generate corresponding text fragment sequences; step S602, performing preset N-gram word segmentation processing on each Frei, and performing combination and duplicate removal on segmented words of all the Frei of each Sret to obtain a corresponding segmented word vector FBe; step S603, combining and de-duplicating the segmented words in all the FBe to obtain a segmented word set FC, and determining the number of the segmented words of the FC as the dimension of one-hot coding; step S604, performing one-hot coding on the word segmentation vector FBe based on the dimension of one-hot coding, and obtaining an original feature parameter value of each Sret; and step S605, training based on the original characteristic parameter value of Sre to obtain an industrial control network vulnerability prediction model, and predicting the vulnerability outbreak probability of the industrial control network. According to the invention, the vulnerability outbreak probability of the industrial control network can be quickly and accurately predicted, and the safety of the industrial control network is improved.
Owner:山东云天安全技术有限公司

Instruction vulnerability prediction method and system based on deep random forest

The invention discloses an instruction vulnerability prediction method and system based on a deep random forest, and the method comprises the steps: extracting the instruction feature information, related to the instruction vulnerability, of each program instruction, and generating an instruction feature vector representing the instruction vulnerability; performing fault injection on the trainingprogram to obtain a vulnerability value of each program instruction; generating an instruction vulnerability sample data set in combination with the instruction feature vector and the instruction vulnerability value; performing sliding sampling on the instruction vulnerability sample data set through a sliding window to generate an extended sample data set; constructing and training an instructionvulnerability prediction model based on the deep random forest; and extracting an instruction feature vector of the to-be-predicted target program, and combining the instruction feature vector with the instruction vulnerability prediction model to realize instruction vulnerability prediction of the to-be-predicted target program. The system is used for realizing the method. The method is high inprediction accuracy, low in demand for a sample set and less in required manual adjustment work, and can be effectively applied to prediction of instruction vulnerability after a program is affected by an instantaneous fault.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

System for predicting industrial control network vulnerabilities based on Summary length features

The invention relates to a system for predicting industrial control network vulnerabilities based on Summary length features, and the method comprises the implementation steps: S300, obtaining a text sequence {Str1, Str2,...} of each sample vulnerability id in the corresponding Summary; s301, when e is equal to 1, determining the feature weight we of the Sre according to the length of the Sre; Step S302, when e is greater than 1, comparing the text information of the Stre-1 and the text information of the Stre; if the two are consistent, judging whether z * we-1 is larger than a preset first feature weight threshold value wemin or not; if yes, setting w = z * we-1; if z * we-1 is smaller than or equal to wemin, setting wee to be equal to wemin; if the text information of the Stre-1 is inconsistent with the text information of the Stre, determining a feature weight we of the Stre according to the length of the Stre; step S303, based on the feature weight we of each Stre and the Stre, determining a Summary feature parameter value corresponding to each Stre; and step S304, training based on the Summary feature parameter value corresponding to the sample vulnerability id to obtain an industrial control network vulnerability prediction model to predict an industrial control network vulnerability outbreak probability. According to the invention, the vulnerability outbreak probability of the industrial control network can be quickly and accurately predicted, and the safety of the industrial control network is improved.
Owner:山东云天安全技术有限公司

Docker mirror image scanning method based on static analysis

PendingCN114564719AValid scanFully reflect the security situationPlatform integrity maintainanceComputer graphics (images)Algorithm
The invention discloses a Docker mirror image scanning method based on static analysis, and the method comprises the steps: carrying out the feature extraction of a large number of Docker mirror image construction historical records through a manual analysis method, building a safety feature library, carrying out the feature matching of a to-be-detected mirror image according to the safety feature library, and detecting the safety problem of the mirror image according to the feature information and a white list mechanism. Meanwhile, the number of software vulnerabilities in the mirror image is detected through a mirror image scanning tool, function fitting is conducted according to a scatter diagram of time distribution, a vulnerability prediction model is established, finally, the safety problem of the Docker mirror image is comprehensively analyzed through information of the software vulnerabilities and the scatter diagram, and a mirror image scanning result is fed back. According to the method, mirror image software vulnerabilities are analyzed in combination with a mirror image scanning tool and a self-defined scanning method, the mirror image scanning tool analyzes the mirror image software vulnerabilities, function fitting is carried out according to a vulnerability number distribution scatter diagram, and a mirror image vulnerability prediction model is established.
Owner:ZHEJIANG UNIV

A system for predicting industrial control network vulnerabilities based on summary word segmentation features

The present invention relates to a system for predicting industrial control network vulnerabilities based on summary word segmentation features, and implements step S400, acquiring the text sequence of each sample vulnerability id in the corresponding summary; step S401, comparing Str e Process to get the corresponding word segmentation set A e ; Step S402, when e=1, according to A e The number of participles determines Str e The feature weight w e ; Step S403, when e>1, compare Str e‑1 and Str e , if they are exactly the same, set w e =w e‑1 , if it is not completely consistent, then the participle set A e and participle set A e‑1 Perform the set difference operation to get A e relative to A e‑1 The number of difference participles A e ‑A e‑1 , and A e‑1 relative to A e The number of difference participles A e‑1‑ A e1 , set w e =[(A e ‑A e‑1 ) / (A e‑1‑ A e1 )]*w e‑1 ; Step S404, determine each Str e Corresponding summary characteristic parameter values; step S405, training to obtain an industrial control network vulnerability prediction model, and predicting the industrial control network vulnerability outbreak probability. The present invention can quickly and accurately predict the industrial control network vulnerability outbreak probability and improve the security of the industrial control network.
Owner:山东云天安全技术有限公司

System for Predicting Vulnerabilities of Industrial Control Network Based on Modified Parameters

The present invention relates to a system for predicting loopholes in industrial control networks based on correction parameters, which implements step S201, obtaining P corresponding to each sample loophole id in a preset training period from a database. m The parameter value list, the actual outbreak probability list of Internet vulnerabilities, the actual outbreak probability list of industrial control network vulnerabilities and the true value of the industrial control network vulnerability outbreak probability; step S202, determine the correction parameter P corresponding to each sample vulnerability id CVE , to determine the corresponding training parameter value PC m , PC-based m Generate a model input vector for each sample vulnerability id; step S203, modify the parameter P according to all sample vulnerability ids CVE , training the model input vector and the true value of the vulnerability outbreak probability of the industrial control network to obtain the vulnerability prediction model of the industrial control network; step S204 , predicting the outbreak probability of the vulnerability of the industrial control network based on the vulnerability prediction model of the industrial control network. The invention can quickly and accurately predict the outbreak probability of loopholes in the industrial control network and improve the security of the industrial control network.
Owner:山东云天安全技术有限公司

System for predicting industrial control network vulnerability based on Internet and industrial control network vulnerability parameters

The invention relates to a system for predicting industrial control network vulnerabilities based on Internet and industrial control network vulnerability parameters. The implementation steps are as follows: S101, obtaining a training period T0 = LCM (TPm) of a training data set; S102, acquiring a parameter value list of Pm, a parameter value list of Qn and an industrial control network vulnerability burst probability true value corresponding to each sample vulnerability id within T0 before the current moment from a database; S103, determining a training parameter value PCm of the Pm and a training parameter value QCn of the Qn, and generating a model input vector of each sample vulnerability id based on the PCm and the QCn; S104, training according to all sample vulnerability id model input vectors and an industrial control network vulnerability burst probability true value to obtain an industrial control network vulnerability prediction model; and S105, predicting the vulnerability outbreak probability of the industrial control network based on the industrial control network vulnerability prediction model. According to the method, the vulnerability outbreak probability of the industrial control network can be quickly and accurately predicted, and the safety of the industrial control network is improved.
Owner:山东云天安全技术有限公司

Instruction vulnerability prediction method and system based on deep random forest

The invention discloses a method and system for predicting instruction vulnerability based on deep random forest. The method includes: extracting instruction feature information related to each program instruction and instruction vulnerability, and generating instruction feature vectors representing instruction vulnerability; training program Perform fault injection to obtain the vulnerability value of each program instruction; combine the instruction feature vector and instruction vulnerability value to generate an instruction vulnerability sample data set; perform sliding sampling on the instruction vulnerability sample data set through a sliding window to generate an extended sample data set ; Construct and train an instruction vulnerability prediction model based on deep random forest; extract the instruction feature vector of the target program to be predicted, and combine the instruction vulnerability prediction model to realize the instruction vulnerability prediction of the target program to be predicted. The system is used to implement the above method. The invention has high prediction accuracy, low demand for sample sets and less manual adjustment work, and can be effectively applied to the prediction of instruction vulnerability after a program is affected by a transient fault.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

System for predicting industrial control network vulnerabilities based on Summary word segmentation features

The invention relates to a system for predicting industrial control network vulnerabilities based on Summary word segmentation features. The implementation steps are as follows: S400, obtaining a text sequence of each sample vulnerability id in a corresponding Summary; step S401, processing the Stre to obtain a corresponding word segmentation set Ae; step S402, when e = 1, determining a feature weight we of Sret according to the word segmentation number of Ae; Step S403, when e is greater than 1, comparing Stre-1 with Stre; if the two are fully consistant, setting we = we-1; if the are not completely consistent, performing set difference set operation on the word segmentation set Ae and the word segmentation set Ae-1 to obtain a difference set word segmentation number Ae-Ae-1 of the Ae relative to the Ae-1 and a difference set word segmentation number Ae-1-Ae1 of the Ae-1 relative to the Ae, and setting we = [(Ae-Ae-1)/(Ae-1-Ae1)] * w <we-1 >; step S404, determining a Summary characteristic parameter value corresponding to each Stre; and S405, training to obtain the industrial control network vulnerability prediction model, and predicting the vulnerability outbreak probability of the industrial control network. According to the invention, the vulnerability outbreak probability of the industrial control network can be rapidly and accurately predicted, and the security of the industrial control network is improved.
Owner:山东云天安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products