A software security analysis method and system based on immune model

A software security and analysis method technology, applied in computer security devices, instruments, computing, etc., can solve problems such as high complexity, difficulty in automatic discovery, and large result sets of static analysis methods.

Active Publication Date: 2020-07-10
NAT UNIV OF DEFENSE TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Software security analysis has the characteristics of large calculation scale and high complexity. However, the existing software security analysis methods have shortcomings in detection efficiency and result accuracy, which are mainly reflected in the large test result set and high false alarm rate of static analysis methods. And there will be no analysis and inspection for functions and program structures; the efficiency of dynamic analysis is not high, and it is not easy to realize automatic discovery; Fuzzing technology is not universal, and the construction and testing cycle is long.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software security analysis method and system based on immune model
  • A software security analysis method and system based on immune model
  • A software security analysis method and system based on immune model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] like figure 1 As shown, the implementation steps of the immune model-based software security analysis method in this embodiment include:

[0046] 1) Perform feature sampling on normal system and software operation in advance to extract the self-signature library S, and generate an antibody library based on the self-signature library S according to the negative selection principle of artificial immunization; jump to the next step when software security analysis is required;

[0047] 2) Perform feature sampling on the runtime of the current system and software to extract the antigen library, match the characteristic strings in the antigen library with the antibodies in the antibody library, and report a security incident if the matching conditions are met.

[0048] Negative Selection Algorithm (Negative Selection Algorithm) is a bionic algorithm proposed with reference to the negative selection principle of the biological immune system, and is one of the core algorithms ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software security analysis method and system based on an immune model. The method includes the steps of conducting feature sampling on the runtime of the normal system and software to extract a self-feature library, and based on the self-feature library, generating an antibody library according to the negative selection principle of artificial immunity; conducting feature sampling on the runtime of the current system and software to extract an antigen library, conducting matching detection on feature strings in the antigen library and antibodies in the antibody library, and if conforming to matching conditions, reporting a security event. The system includes program modules corresponding to the method. According to the method and the system, based on a biological immune system, combined with practical application, the abstract artificial immune model corresponds to various indicators of the software system, various feature events of the software system are extracted, and the self-features of the normal system are defined; the occurrence of the security event in the system is judged by recognizing 'non-self', and the artificial immunity is innovatively applied to software safety detection based on the system runtime.

Description

technical field [0001] The invention relates to software safety analysis technology, in particular to a software safety analysis method and system based on an immune model. Background technique [0002] Software security analysis has the characteristics of large calculation scale and high complexity. However, the existing software security analysis methods have shortcomings in detection efficiency and result accuracy, which are mainly reflected in the large test result set and high false alarm rate of static analysis methods. And there will be no analysis and inspection for functions and program structures; the efficiency of dynamic analysis is not high, and it is not easy to realize automatic discovery; Fuzzing technology is not universal, and the construction and testing cycle is long. Therefore, in view of the deficiencies of existing security analysis techniques, the subject is conducting research on new software security analysis methods, proposing a software security a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/552G06F21/566G06F2221/033
Inventor 丁滟戴华东董攀黄辰林谭郁松陈松政魏立峰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products