• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于改进信息增益算法的漏洞提取与预测方法。

Vulnerability extraction and prediction method based on improved information gain algorithm.

机构信息

School of Computer Science and Engineering, North Minzu University, Yinchuan, China.

出版信息

PLoS One. 2024 Sep 10;19(9):e0309809. doi: 10.1371/journal.pone.0309809. eCollection 2024.

DOI:10.1371/journal.pone.0309809
PMID:39255289
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11386448/
Abstract

More and more attention has been paid to computer security, and its vulnerabilities urgently need more sensitive solutions. Due to the incomplete data of most vulnerability libraries, it is difficult to obtain pre-permission and post-permission of vulnerabilities, and construct vulnerability exploitation chains, so it cannot to respond to vulnerabilities in time. Therefore, a vulnerability extraction and prediction method based on improved information gain algorithm is proposed. Considering the accuracy and response speed of deep neural network, deep neural network is adopted as the basic framework. The Dropout method effectively reduces overfitting in the case of incomplete data, thus improving the ability to extract and predict vulnerabilities. These experiments confirmed that the excellent F1 and Recall of the improved method reached 0.972 and 0.968, respectively. Compared to the function fingerprints vulnerability detection method and K-nearest neighbor algorithm, the convergence is better. Its response time is 0.12 seconds, which is excellent. To ensure the reliability and validity of the proposed method in the face of missing data, the reliability and validity of Mask test are verified. The false negative rate was 0.3% and the false positive rate was 0.6%. The prediction accuracy of this method for existing permissions reached 97.9%, and it can adapt to the development of permissions more actively, so as to deal with practical challenges. In this way, companies can detect and discover vulnerabilities earlier. In security repair, this method can effectively improve the repair speed and reduce the response time. The prediction accuracy of post-existence permission reaches 96.8%, indicating that this method can significantly improve the speed and efficiency of vulnerability response, and strengthen the understanding and construction of vulnerability exploitation chain. The prediction of the posterior permission can reduce the attack surface of the vulnerability, thus reducing the risk of breach, speeding up the detection of the vulnerability, and ensuring the timely implementation of security measures. This model can be applied to public network security and application security scenarios in the field of computer security, as well as personal computer security and enterprise cloud server security. In addition, the model can also be used to analyze attack paths and security gaps after security accidents. However, the prediction of post-permissions is susceptible to dynamic environments and relies heavily on the updated guidance of security policy rules. This method can improve the accuracy of vulnerability extraction and prediction, quickly identify and respond to security vulnerabilities, shorten the window period of vulnerability exploitation, effectively reduce security risks, and improve the overall network security defense capability. Through the application of this model, the occurrence frequency of security vulnerability time is reduced effectively, and the repair time of vulnerability is shortened.

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/9ff5c07c308a/pone.0309809.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/915deb1ca9c7/pone.0309809.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/13dee7acb327/pone.0309809.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/9ff5c07c308a/pone.0309809.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/915deb1ca9c7/pone.0309809.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/13dee7acb327/pone.0309809.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/584e/11386448/9ff5c07c308a/pone.0309809.g008.jpg
摘要

越来越多的人关注计算机安全,其漏洞亟待更敏感的解决方案。由于大多数漏洞库的数据不完整,难以获取漏洞的预授权和后授权,并构建漏洞利用链,因此无法及时响应漏洞。因此,提出了一种基于改进信息增益算法的漏洞提取和预测方法。考虑到深度神经网络的准确性和响应速度,采用深度神经网络作为基本框架。Dropout 方法有效地减少了不完全数据情况下的过拟合,从而提高了漏洞提取和预测能力。这些实验证实,改进方法的优秀 F1 和召回率分别达到 0.972 和 0.968。与功能指纹漏洞检测方法和 K-最近邻算法相比,收敛性更好。其响应时间为 0.12 秒,性能优异。为了确保在面对缺失数据时提出的方法的可靠性和有效性,验证了 Mask 测试的可靠性和有效性。假阴性率为 0.3%,假阳性率为 0.6%。该方法对现有权限的预测准确率达到 97.9%,能更积极地适应权限的发展,从而应对实际挑战。这样,公司可以更早地发现和发现漏洞。在安全修复方面,该方法可以有效提高修复速度,减少响应时间。对后存在权限的预测准确率达到 96.8%,表明该方法可以显著提高漏洞响应的速度和效率,增强对漏洞利用链的理解和构建。对后存在权限的预测可以减少漏洞的攻击面,从而降低漏洞被利用的风险,加快漏洞的检测,确保安全措施的及时实施。该模型可以应用于计算机安全领域的公共网络安全和应用安全场景,以及个人计算机安全和企业云服务器安全。此外,该模型还可以用于分析安全事故后的攻击路径和安全漏洞。然而,后授权的预测容易受到动态环境的影响,并且严重依赖于安全策略规则的更新指导。该方法可以提高漏洞提取和预测的准确性,快速识别和响应安全漏洞,缩短漏洞利用的窗口期,有效降低安全风险,提高整体网络安全防御能力。通过该模型的应用,有效降低了安全漏洞时间的发生频率,缩短了漏洞的修复时间。

相似文献

1
Vulnerability extraction and prediction method based on improved information gain algorithm.基于改进信息增益算法的漏洞提取与预测方法。
PLoS One. 2024 Sep 10;19(9):e0309809. doi: 10.1371/journal.pone.0309809. eCollection 2024.
2
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.具有新型代价函数和自定义训练词向量嵌入的改进型漏洞利用预测模型。
Sensors (Basel). 2021 Jun 20;21(12):4220. doi: 10.3390/s21124220.
3
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm.FastEmbed:基于集成机器学习算法的漏洞利用可能性预测。
PLoS One. 2020 Feb 6;15(2):e0228439. doi: 10.1371/journal.pone.0228439. eCollection 2020.
4
Open source software security vulnerability detection based on dynamic behavior features.基于动态行为特征的开源软件安全漏洞检测。
PLoS One. 2019 Aug 23;14(8):e0221530. doi: 10.1371/journal.pone.0221530. eCollection 2019.
5
Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.深度学习算法在视频图像大数据安全防护中的优化。
Comput Intell Neurosci. 2022 Mar 8;2022:3394475. doi: 10.1155/2022/3394475. eCollection 2022.
6
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
7
Network Security Situation Prediction Model Based on EMD and ELPSO Optimized BiGRU Neural Network.基于 EMD 和 ELPSO 优化 BiGRU 神经网络的网络安全态势预测模型。
Comput Intell Neurosci. 2022 Jun 21;2022:6031129. doi: 10.1155/2022/6031129. eCollection 2022.
8
Smart Contract Vulnerability Detection Model Based on Multi-Task Learning.基于多任务学习的智能合约漏洞检测模型。
Sensors (Basel). 2022 Feb 25;22(5):1829. doi: 10.3390/s22051829.
9
Improved SSD network for fast concealed object detection and recognition in passive terahertz security images.改进的 SSD 网络用于快速在被动太赫兹安全图像中检测和识别隐藏物体。
Sci Rep. 2022 Jul 15;12(1):12082. doi: 10.1038/s41598-022-16208-0.
10
A detection method for android application security based on TF-IDF and machine learning.基于 TF-IDF 和机器学习的安卓应用安全检测方法。
PLoS One. 2020 Sep 11;15(9):e0238694. doi: 10.1371/journal.pone.0238694. eCollection 2020.