期刊文献+

基于本体的软件安全漏洞模式

Software security vulnerability patterns based on ontology
下载PDF
导出
摘要 针对软件缺陷与软件安全漏洞研究中存在的概念混淆问题,对DevSecOps框架下的软件安全漏洞生存期进行研究。基于软件安全漏洞生存期引入漏洞的4种情况,结合漏洞的特点提出软件安全漏洞模式定义,并采用本体方法进行表示。本体是概念化明确的规范说明,能够解决软件安全漏洞研究领域存在的二义性、不一致性、难以共享,以及由分析知识分散所导致的对人员知识和经验过度依赖的问题。以软件安全漏洞模式的分析为基础,兼顾宏观事件表现,构造漏洞分析的3层模型,即事件表示层、行为动作层和漏洞技术层。实例应用所构模型的层次结构实施渗透测试,包括安全风险分析、威胁建模、漏洞分析及渗透攻击等。实验结果表明:基于所提软件安全漏洞模式本体库的改进渗透测试具有科学性和有效性。 This paper studies the lifetime of software security vulnerabilities under the DevSecOps framework aiming at the conceptual confusion problem of research on software errors and software security vulnerabilities.This work provides a definition of software security vulnerability pattern together with vulnerability characteristics,and uses ontology to represent it.It is based on four scenarios of introducing vulnerabilities in the life cycle of software security vulnerabilities.An ontology is an explicit specification of a conceptualization,which can solve the problems of ambiguity,inconsistency,difficulty in sharing,and excessive dependence on personnel knowledge and experience caused by the dispersion of analysis knowledge in the field of software security vulnerability research.A three-layer model for vulnerability analysis is built,comprising the event representation layer,behavior action layer,and vulnerability technology layer,based on the study of software security vulnerability patterns and accounting for the macro event performance.The example application implements penetration testing according to the hierarchical structure of the bulit model,including security risk analysis,threat modeling,vulnerability analysis,and penetration attacks.The experimental results show that the improved penetration testing method based on the software security vulnerability pattern ontology library proposed in this paper is scientific and effective.
作者 胡璇 陈俊名 李海峰 HU Xuan;CHEN Junming;LI Haifeng(Information Security Center,The Fifth Research Institute of Electronics,Ministry of Industry and Information Technology,Guangzhou 511370,China;The Ministry of Industry and Information Technology Key Laboratory of Performance and Reliability Testing and Evaluation for Basic Software and Hardware,Guangzhou 511370,China;School of Reliability and Systems Engineering,Beihang University,Beijing 100191,China)
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2024年第10期3084-3099,共16页 Journal of Beijing University of Aeronautics and Astronautics
基金 国家重点研发计划(2021YFB2012205)。
关键词 软件缺陷 软件安全漏洞 模式 本体 渗透测试 software error software security vulnerabilities pattern ontology penetration testing
  • 相关文献

参考文献6

二级参考文献31

  • 1宋鸿运,王东华,商瑶玲,张北飞.1∶25万国家基础地理数据的管理及应用[J].测绘通报,2001(10):34-35. 被引量:6
  • 2文浩.无处不在的终极网络——泛在网[J].射频世界,2010(1):44-47. 被引量:8
  • 3裴炳镇,陈晓明,胡熠,陆汝占.一种建立中文概念分类关系的新算法[J].计算机工程与应用,2004,40(36):18-21. 被引量:8
  • 4Chen T Y,IEEE Transactions on SoftwareEngineering,1996年,22卷,22期,109页
  • 5Chen T Y,IEEE Transactionson Software Engineering,1994年,20卷,12期,977页
  • 6Malaiya Y K,Proceedings of the Fifth International Symposium on Software Reliability Enginee,1994年,186页
  • 7Han Jiawei,Kamber M. Data Mining:Concepts and Techniques[M].Canada:Morgan Kaufmann Publishers,2001.
  • 8Studer R,Benjamins V R,Fensel D. Knowledge engineering,principles and methods[J].Data and Knowledgeing,1998,(1-2):161-197.
  • 9Nigro HO,GonzalezSE C,XodoDH. Data Mining with Ontologies:Implementations,Findings,and Frameworks[M].USA:Idea Group Reference,2008.
  • 10Chen Xiaoming,Zhou Xuan,Scherl R. Using an interest ontology for improved support in rule mining[A].Prague:Springer Berlin Heidelberg,2003.320-329.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部