CN113704751B - 基于人工智能决策的漏洞修复方法及大数据挖掘系统 - Google Patents
基于人工智能决策的漏洞修复方法及大数据挖掘系统 Download PDFInfo
- Publication number
- CN113704751B CN113704751B CN202111015437.9A CN202111015437A CN113704751B CN 113704751 B CN113704751 B CN 113704751B CN 202111015437 A CN202111015437 A CN 202111015437A CN 113704751 B CN113704751 B CN 113704751B
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- repair
- information
- activity
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013473 artificial intelligence Methods 0.000 title claims abstract description 37
- 238000007418 data mining Methods 0.000 title claims abstract description 21
- 238000010586 diagram Methods 0.000 claims abstract description 22
- 230000002159 abnormal effect Effects 0.000 claims description 797
- 230000000694 effects Effects 0.000 claims description 671
- 230000008439 repair process Effects 0.000 claims description 401
- 238000012549 training Methods 0.000 claims description 115
- 238000000605 extraction Methods 0.000 claims description 92
- 125000004122 cyclic group Chemical group 0.000 claims description 77
- 238000005065 mining Methods 0.000 claims description 54
- 238000004458 analytical method Methods 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 6
- 238000005067 remediation Methods 0.000 claims description 3
- 230000000875 corresponding effect Effects 0.000 description 126
- 238000013461 design Methods 0.000 description 37
- 239000013598 vector Substances 0.000 description 19
- 238000004891 communication Methods 0.000 description 13
- 238000004220 aggregation Methods 0.000 description 11
- 230000002776 aggregation Effects 0.000 description 11
- 238000013507 mapping Methods 0.000 description 9
- 238000001914 filtration Methods 0.000 description 8
- 230000004931 aggregating effect Effects 0.000 description 6
- 238000009826 distribution Methods 0.000 description 5
- 230000000052 comparative effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004573 interface analysis Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 2
- 238000009412 basement excavation Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013136 deep learning model Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Computation (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111015437.9A CN113704751B (zh) | 2021-08-31 | 2021-08-31 | 基于人工智能决策的漏洞修复方法及大数据挖掘系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111015437.9A CN113704751B (zh) | 2021-08-31 | 2021-08-31 | 基于人工智能决策的漏洞修复方法及大数据挖掘系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113704751A CN113704751A (zh) | 2021-11-26 |
CN113704751B true CN113704751B (zh) | 2022-03-29 |
Family
ID=78658229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111015437.9A Active CN113704751B (zh) | 2021-08-31 | 2021-08-31 | 基于人工智能决策的漏洞修复方法及大数据挖掘系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113704751B (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116070111B (zh) * | 2022-11-17 | 2023-08-04 | 北京东方通科技股份有限公司 | 一种基于ai的大数据挖掘的辅助决策方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104935570A (zh) * | 2015-04-22 | 2015-09-23 | 电子科技大学 | 基于网络流连接图的网络流连接行为特征分析方法 |
CN109543417A (zh) * | 2018-11-26 | 2019-03-29 | 杭州安恒信息技术股份有限公司 | 一种基于Qemu平台的漏洞挖掘方法和装置 |
CN110460571A (zh) * | 2019-07-05 | 2019-11-15 | 深圳壹账通智能科技有限公司 | 业务系统漏洞处理方法、装置、计算机设备和存储介质 |
CN112016526A (zh) * | 2020-10-16 | 2020-12-01 | 金税信息技术服务股份有限公司 | 场所活动对象的行为监测分析系统、方法、装置和设备 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11017096B2 (en) * | 2018-06-01 | 2021-05-25 | University Of South Florida | Prediction of software vulnerabilities |
-
2021
- 2021-08-31 CN CN202111015437.9A patent/CN113704751B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104935570A (zh) * | 2015-04-22 | 2015-09-23 | 电子科技大学 | 基于网络流连接图的网络流连接行为特征分析方法 |
CN109543417A (zh) * | 2018-11-26 | 2019-03-29 | 杭州安恒信息技术股份有限公司 | 一种基于Qemu平台的漏洞挖掘方法和装置 |
CN110460571A (zh) * | 2019-07-05 | 2019-11-15 | 深圳壹账通智能科技有限公司 | 业务系统漏洞处理方法、装置、计算机设备和存储介质 |
CN112016526A (zh) * | 2020-10-16 | 2020-12-01 | 金税信息技术服务股份有限公司 | 场所活动对象的行为监测分析系统、方法、装置和设备 |
Non-Patent Citations (7)
Title |
---|
《(十三)路径、漏斗、归因和热力图分析》;晓迦;《https://www.jianshu.com/p/9eaf6c4fc34d?utm_campaign=maleskine&utm_content=note&utm_medium=seo_notes&utm_source=recommendation》;20190609;第1-4页 * |
《Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?》;Yuanlong Cao等;《IEEE Access》;20200903;第8卷;第165872-165883页 * |
《Front-end-of-line attacks in split manufacturing》;Yuejie Wang等;《2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 》;20180405;第1-8页 * |
《Quantitative evaluation of register vulnerabilities in RTL control paths》;Liang Chen等;《2014 19th IEEE European Test Symposium (ETS)》;20140708;第1-2页 * |
《智能化漏洞挖掘技术总结》;Neil-Yale;《https://blog.csdn.net/yalecaltech/article/details/112705665》;20210116;第1-19页 * |
《算子函数的(ω)性质的判定》;姜虎;《山东大学学报(理学版)》;20201031;第55卷(第10期);第83-87页 * |
《面向对抗样本攻击的移动目标防御》;王滨等;《网络与信息安全学报》;20210228;第7卷(第1期);第113-120页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113704751A (zh) | 2021-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113704771B (zh) | 基于人工智能分析的服务漏洞挖掘方法及大数据挖掘系统 | |
CN112636958B (zh) | 意图驱动网络中的策略自动化验证方法 | |
CN113407951A (zh) | 基于人工智能的云服务漏洞修复方法及大数据分析系统 | |
CN113422782A (zh) | 基于大数据的云服务漏洞分析方法及人工智能分析系统 | |
CN113098884A (zh) | 基于大数据的网络安全监控方法、云平台系统及介质 | |
CN113704751B (zh) | 基于人工智能决策的漏洞修复方法及大数据挖掘系统 | |
CN112801231B (zh) | 用于业务对象分类的决策模型训练方法和装置 | |
CN113411342A (zh) | 基于大数据的信息安全风险识别方法及人工智能安全系统 | |
CN114143060B (zh) | 基于人工智能预测的信息安全预测方法及大数据安全系统 | |
CN113722719A (zh) | 针对安全拦截大数据分析的信息生成方法及人工智能系统 | |
CN115048370A (zh) | 用于大数据清洗的人工智能处理方法及大数据清洗系统 | |
CN116361974A (zh) | 一种基于公路业务及数据网络的数据源重要性判别方法 | |
Kalantari et al. | Dynamic software rejuvenation in web services: a whale optimizationalgorithm-based approach | |
US20080155496A1 (en) | Program for processor containing processor elements, program generation method and device for generating the program, program execution device, and recording medium | |
He et al. | Firmware vulnerabilities homology detection based on clonal selection algorithm for IoT devices | |
Derstepanians et al. | Near real-time anomaly detection in NFV infrastructures | |
CN114647790A (zh) | 应用于行为意图分析的大数据挖掘方法及云端ai服务系统 | |
CN113722711A (zh) | 基于大数据安全漏洞挖掘的数据添加方法及人工智能系统 | |
Eisenhut et al. | Automatic metamorphic test oracles for action-policy testing | |
CN117675823A (zh) | 算力网络的任务处理方法、装置、电子设备及存储介质 | |
CN115422486B (zh) | 基于人工智能的云服务在线页面优化方法及大数据系统 | |
CN114143059B (zh) | 基于大数据信息安全的安全防护指标优化方法及人工智能系统 | |
CN114978765B (zh) | 服务于信息攻击防御的大数据处理方法及ai攻击防御系统 | |
CN114780967B (zh) | 基于大数据漏洞挖掘的挖掘评估方法及ai漏洞挖掘系统 | |
CN115903503A (zh) | 基于goap的人工智能引擎的控制方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220119 Address after: 250014 Room 401, building 2, Huaxin business building, No. 205 Huayuan Road, Lixia District, Jinan City, Shandong Province Applicant after: Shandong Ruijin Data Service Co.,Ltd. Address before: Room 413, 4th floor, Qilu Software Park building, south head of Xinyu Road, high tech Zone, Jinan City, Shandong Province Applicant before: Jiang Hu |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20220211 Address after: Room 413, 4th floor, Qilu Software Park building, south head of Xinyu Road, high tech Zone, Jinan City, Shandong Province Applicant after: Jiang Hu Address before: 250014 Room 401, building 2, Huaxin business building, No. 205 Huayuan Road, Lixia District, Jinan City, Shandong Province Applicant before: Shandong Ruijin Data Service Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220311 Address after: Room 1512, block D, Zhonghong Plaza, 6-17 Jiefang East Road, Lixia District, Jinan City, Shandong Province Applicant after: SHANDONG ZHONGGUAN CHUANGYE INFORMATION TECHNOLOGY Co.,Ltd. Address before: Room 413, 4th floor, Qilu Software Park building, south head of Xinyu Road, high tech Zone, Jinan City, Shandong Province Applicant before: Jiang Hu |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A vulnerability repair method and big data mining system based on artificial intelligence decision-making Effective date of registration: 20230912 Granted publication date: 20220329 Pledgee: Postal Savings Bank of China Limited Jinan Branch Pledgor: SHANDONG ZHONGGUAN CHUANGYE INFORMATION TECHNOLOGY Co.,Ltd. Registration number: Y2023980056386 |