CN116383031A - Automatic audit method for source code security vulnerabilities based on scene data - Google Patents

Automatic audit method for source code security vulnerabilities based on scene data Download PDF

Info

Publication number
CN116383031A
CN116383031A CN202210079783.1A CN202210079783A CN116383031A CN 116383031 A CN116383031 A CN 116383031A CN 202210079783 A CN202210079783 A CN 202210079783A CN 116383031 A CN116383031 A CN 116383031A
Authority
CN
China
Prior art keywords
security
audit
vulnerability
data
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210079783.1A
Other languages
Chinese (zh)
Inventor
王宏
高新亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sikeyun Beijing Software Technology Co ltd
Original Assignee
Sikeyun Beijing Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sikeyun Beijing Software Technology Co ltd filed Critical Sikeyun Beijing Software Technology Co ltd
Priority to CN202210079783.1A priority Critical patent/CN116383031A/en
Publication of CN116383031A publication Critical patent/CN116383031A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis

Abstract

The invention discloses a scene data-based automatic audit method for source code security vulnerabilities, which comprises the following steps: s1, acquiring a detection result; s2, extracting all scene information related to the security hole; s3, extracting all scene information of the checked application system; s4, starting an audit mark analysis engine, wherein the audit mark analysis engine analyzes security vulnerability information in the detection result through the scenerization information; obtaining analysis data of each security hole; s5, matching the analysis data of the security hole with an audit mark rule, and when the analysis data of the security hole is matched with the audit mark rule, indicating that the current security hole meets the audit mark condition, and performing marking operation; s6, judging whether each security hole meeting the audit mark condition needs to be repaired or not, so as to obtain a judging result; and S7, classifying according to the judging result to finally form security vulnerability audit mark item data.

Description

Automatic audit method for source code security vulnerabilities based on scene data
Technical Field
The invention relates to the field of information security, in particular to an automatic audit method for source code security vulnerabilities based on scene data.
Background
With the development of the Internet and information technology, the universal interconnection, the intellectualization and the digital age have come. Security of various software application systems is also becoming more and more important. The concept of DevSecOps is fully popular in the software development industry. The SAST-source code security testing tool becomes an important means for detecting and finding security holes of application systems, and products of SAST at home and abroad are also layered endlessly. The source code security testing tool can comprehensively find security holes on a code layer, but because reported holes are various in types and huge in quantity, thousands of pieces of hole information are frequently used, security auditors do not have places to go down, a large number of repeated works are carried out, the auditors cannot carry out effective security audit, the tools are directly considered to report high errors, detection results are invalid, SAST products are even refused to be used, and huge risks and challenges are brought to software application security assurance and security hole repair.
On the other hand, a large amount of scene data which can be used for audit is provided in the SAST product, and for the scene information of the loopholes, such as: the detailed type, level, generated entry point function, file name, file path, start function of passing value and function of process, all logical operands in passing value, detection engine type, etc. For the scene information of the tested system, such as the type, the security requirement level, the quality requirement level, the actual application scene, whether to follow the industry standard, whether to use a security verification framework and the like, the information can well judge the harmfulness, the effectiveness and the repair necessity of a vulnerability, but the data information is not utilized in the current auditing process; therefore, an auditing method can be researched to efficiently and accurately carry out automatic auditing and marking operation on thousands of security hole data by utilizing the scene information, so that the auditing efficiency of the security hole information is improved.
Disclosure of Invention
The invention aims to solve the problems and provides an automatic auditing method for source code security vulnerabilities based on scene data, which is used for improving auditing efficiency.
In order to achieve the above object, the technical scheme of the present invention is as follows:
a source code security vulnerability automatic auditing method based on scene data comprises the following steps:
s1, acquiring a detection result of a SAST source code security test product;
s2, acquiring description information of the security hole in the detection result, and extracting all scene information related to the security hole by dividing scenes generated by the security hole;
s3, acquiring related information of the checked application system in the checked source code file, and extracting all scene information of the checked application system from the related information by an application system scene information extraction engine;
s4, starting an audit mark analysis engine, wherein the audit mark analysis engine analyzes the security hole information in the detection result through all scene information related to the security hole and all scene information of the detected application system to obtain analysis data of each security hole;
s5, formulating an audit mark rule, matching analysis data of the security vulnerability with the audit mark rule, and when the analysis data of the security vulnerability is matched with the audit mark rule, indicating that the current security vulnerability meets the audit mark condition, and executing the mark operation on the security vulnerability;
s6, judging whether each security hole meeting the audit mark conditions needs to be repaired or not after all security holes meeting the audit mark conditions are marked, so that a judging result is obtained;
and S7, classifying all security vulnerabilities meeting the audit mark conditions according to the judgment result, and finally forming security vulnerability audit mark item data.
Further, in the step S2, all the scenerising information related to the security hole includes, but is not limited to: the method comprises the steps of a vulnerability type, a vulnerability level, a directory where the vulnerability is located, a file where the vulnerability is located, function names of a vulnerability starting position, a vulnerability value transmission process function name list, the number of all logic operations in a vulnerability value transmission process, an analysis engine name for finding the vulnerability and a rule ID for analyzing and obtaining the vulnerability.
Further, in the step S3, all the scenerization information of the examined application system includes, but is not limited to: the system type, the security level of the system, the security standard followed by the system, the application scope of the system, the development framework of the system, whether the system has a unified external data verification mechanism, whether the system has last online test, whether the database data of the system is trusted data, whether the environment variable data of the system is trusted data, whether the system complies with national commercial password requirements, and the like.
Further, all the scenerization information related to the security hole extracted in the step S2 and all the scenerization information of the tested application system extracted in the step S3 are stored in a Key-Value (Key-Value) format.
Further, in step S7, the security vulnerability audit tag item data includes an audit item and a tag item, where the audit item may be briefly classified into: has the advantages of relieving measures, no need of repair, availability, false alarm and the like; marking items includes ignoring, temporarily ignoring, completing a repair within a certain time, repairing immediately, etc.
Compared with the prior art, the invention has the advantages and positive effects that:
the invention constructs an automatic audit method of the security holes of the source codes based on scene data, which can automatically audit and mark the security holes detected by SAST source code security detection products, reduces a large number of repeated audit works of security auditors, has an efficient and rapid vulnerability marking processing mode, automatically marks and eliminates false alarm problems through conditions, and effectively improves the audit efficiency of the security holes; meanwhile, the security hole which is harmful to the system security can be marked, so that the security protection navigation of the application system developed and used by enterprises can be ensured; on the other hand, the invention has simple operation, can be used by common business personnel through simple training, and has popularization and use by utilizing the market; and the applicability of the system can be continuously enhanced only by adding new audit mark rules by a user, so that the use effect of the system is further improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a block diagram of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, modifications, equivalents, improvements, etc., which are apparent to those skilled in the art without the benefit of this disclosure, are intended to be included within the scope of this invention.
As shown in fig. 1, the invention discloses an automatic audit method for security vulnerabilities of source codes based on scene data, which comprises the steps of extracting scene information data of an application system to be tested and scene information data of each security vulnerability in a test result, formatting the scene data, analyzing the scene data in a Key-Value (Key-Value) form through an audit mark analysis engine, and loading audit mark rules to analyze whether keys (Key) and values (Value) meet one rule in the audit mark rules or not, and judging that an audit mark item is added to the current vulnerability according to the scene information data; the whole detection result is marked by traversing all security vulnerabilities and executing an audit marking task.
The specific operation steps of the invention are as follows:
1. inputting a detection result of a SAST source code security test product;
2. and acquiring relevant information of the loopholes, and extracting all scene information related to the loopholes through a loophole scene information extraction engine to form a Key-Value (Key-Value) format. Vulnerability scenario information is shown in the following table:
Figure BDA0003485643330000051
3. and acquiring the related information of the application system, extracting all the scene information of the tested application system through an application system scene information extraction engine, and forming a Key-Value format. The scenario information of the application system is shown in the following table:
Figure BDA0003485643330000052
4. starting an audit mark analysis engine, and analyzing each piece of vulnerability information through the scene information in the Key-Value (Key-Value) format; the audit mark engine mainly uses a regular expression to analyze Key (Key) and Value (Value) information data generated by the extraction engine, then matches each audit mark rule loaded in the subsequent step, and if the Key and the Value are matched, the current vulnerability is proved to meet the audit mark condition, and audit mark operation is carried out;
5. loading an audit mark rule, wherein the audit mark rule is composed of an audit mark condition component and an audit mark item component, and the audit mark rule is shown in the following table:
Figure BDA0003485643330000061
6. after the audit mark is finished, judging whether the current vulnerability is to be repaired or not, and finally carrying out classification statistics to form audit mark item data; when the system is counted, the mark item of the loophole in the audit mark rule is marked as audit mark item data,
the audit trail is composed of an audit trail and a marking trail, and is shown in the following table:
Figure BDA0003485643330000062
Figure BDA0003485643330000071
the invention constructs an automatic audit method of the security holes of the source codes based on scene data, which can automatically audit and mark the security holes detected by SAST source code security detection products, reduces a large number of repeated audit works of security auditors, has an efficient and rapid vulnerability marking processing mode, automatically marks and eliminates false alarm problems through conditions, and effectively improves the audit efficiency of the security holes; meanwhile, the security hole which is harmful to the system security can be marked, so that the security protection navigation of the application system developed and used by enterprises can be ensured; on the other hand, the invention has simple operation, can be used by common business personnel through simple training, and has popularization and use by utilizing the market; and the applicability of the system can be continuously enhanced only by adding new audit mark rules by a user, so that the use effect of the system is further improved.

Claims (5)

1. A source code security vulnerability automatic auditing method based on scene data is characterized in that: the method comprises the following steps:
s1, acquiring a detection result of a SAST source code security test product;
s2, acquiring description information of the security hole in the detection result, and extracting all scene information related to the security hole by dividing scenes generated by the security hole;
s3, acquiring related information about an application system in the detected source code file, and extracting all scene information of the detected application system from the related information by an application system scene information extraction engine;
s4, starting an audit mark analysis engine, wherein the audit mark analysis engine analyzes the security hole information in the detection result through all scene information related to the security hole and all scene information of the detected application system to obtain analysis data of each security hole;
s5, formulating an audit mark rule, matching analysis data of the security vulnerability with the audit mark rule, and when the analysis data of the security vulnerability is matched with the audit mark rule, indicating that the current security vulnerability meets the audit mark condition, and executing the mark operation on the security vulnerability;
s6, judging whether each security hole meeting the audit mark conditions needs to be repaired or not after all security holes meeting the audit mark conditions are marked, so that a judging result is obtained;
and S7, classifying all security vulnerabilities meeting the audit mark conditions according to the judgment result, and finally forming security vulnerability audit mark item data.
2. The automated audit method for source code security vulnerabilities based on scenario data of claim 1, wherein: in the step S2, all the scenerising information related to the security hole includes, but is not limited to: the method comprises the steps of a vulnerability type, a vulnerability level, a directory where the vulnerability is located, a file where the vulnerability is located, function names of a vulnerability starting position, a vulnerability value transmission process function name list, the number of all logic operations in a vulnerability value transmission process, an analysis engine name for finding the vulnerability and a rule ID for analyzing and obtaining the vulnerability.
3. The automated audit method for source code security vulnerabilities based on scenario data of claim 2, wherein: in the step S3, all the scenerization information of the examined application system includes, but is not limited to: the system type, the security level of the system, the security standard followed by the system, the application scope of the system, the development framework of the system, whether the system has a unified external data verification mechanism, whether the system has last online test, whether the database data of the system is trusted data, whether the environment variable data of the system is trusted data, and whether the system complies with the national commercial password requirement.
4. The automated audit method for source code security vulnerabilities based on scenario data of claim 3, wherein: and in the step S2, all the scene information which is extracted and related to the security hole and all the scene information which is extracted and related to the checked application system in the step S3 are stored as a key-value format.
5. The automated auditing method for source code security vulnerabilities based on scenario data of claim 4, wherein: in the step S7, the security vulnerability audit tag item data includes an audit item and a tag item, where the audit item may be briefly classified into: the method has the advantages of relieving measures, no need of repair, availability and false alarm; marking items includes ignoring, temporarily ignoring, completing repair within a certain time, repairing immediately.
CN202210079783.1A 2022-01-24 2022-01-24 Automatic audit method for source code security vulnerabilities based on scene data Pending CN116383031A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210079783.1A CN116383031A (en) 2022-01-24 2022-01-24 Automatic audit method for source code security vulnerabilities based on scene data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210079783.1A CN116383031A (en) 2022-01-24 2022-01-24 Automatic audit method for source code security vulnerabilities based on scene data

Publications (1)

Publication Number Publication Date
CN116383031A true CN116383031A (en) 2023-07-04

Family

ID=86971732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210079783.1A Pending CN116383031A (en) 2022-01-24 2022-01-24 Automatic audit method for source code security vulnerabilities based on scene data

Country Status (1)

Country Link
CN (1) CN116383031A (en)

Similar Documents

Publication Publication Date Title
Pang et al. Predicting vulnerable software components through deep neural network
US10303874B2 (en) Malicious code detection method based on community structure analysis
US11418485B2 (en) Pattern-based malicious URL detection
CN113032792B (en) System business vulnerability detection method, system, equipment and storage medium
CN104735074A (en) Malicious URL detection method and implement system thereof
EP3566166B1 (en) Management of security vulnerabilities
CN113098887A (en) Phishing website detection method based on website joint characteristics
Lal et al. Logopt: Static feature extraction from source code for automated catch block logging prediction
CN107368592B (en) Text feature model modeling method and device for network security report
CN115292674A (en) Fraud application detection method and system based on user comment data
CN106790025B (en) Method and device for detecting link maliciousness
CN110598397A (en) Deep learning-based Unix system user malicious operation detection method
CN111581110B (en) Service data accuracy detection method, device, system and storage medium
CN113434855A (en) Security event processing method and device and readable storage medium
CN110019762B (en) Problem positioning method, storage medium and server
CN109918638B (en) Network data monitoring method
CN105808602B (en) Method and device for detecting junk information
CN112016317A (en) Sensitive word recognition method and device based on artificial intelligence and computer equipment
CN116383031A (en) Automatic audit method for source code security vulnerabilities based on scene data
KR20220116410A (en) Security compliance automation method
CN111934949A (en) Safety test system based on database injection test
CN113055396B (en) Cross-terminal traceability analysis method, device, system and storage medium
CN115935359B (en) File processing method, device, computer equipment and storage medium
CN112187768B (en) Method, device and equipment for detecting bad information website and readable storage medium
CN115118498B (en) Vulnerability data analysis method and system based on relevance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination