CN112016097B - A method to predict when network security vulnerabilities will be exploited - Google Patents
A method to predict when network security vulnerabilities will be exploited Download PDFInfo
- Publication number
- CN112016097B CN112016097B CN202010889524.6A CN202010889524A CN112016097B CN 112016097 B CN112016097 B CN 112016097B CN 202010889524 A CN202010889524 A CN 202010889524A CN 112016097 B CN112016097 B CN 112016097B
- Authority
- CN
- China
- Prior art keywords
- time
- network security
- data
- vulnerability
- utilized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2413—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
- G06F18/24133—Distances to prototypes
- G06F18/24137—Distances to cluster centroïds
- G06F18/2414—Smoothing the distance, e.g. radial basis function networks [RBFN]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/049—Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Computation (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Business, Economics & Management (AREA)
- Molecular Biology (AREA)
- Mathematical Physics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computational Linguistics (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Game Theory and Decision Science (AREA)
- General Business, Economics & Management (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010889524.6A CN112016097B (en) | 2020-08-28 | 2020-08-28 | A method to predict when network security vulnerabilities will be exploited |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010889524.6A CN112016097B (en) | 2020-08-28 | 2020-08-28 | A method to predict when network security vulnerabilities will be exploited |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112016097A CN112016097A (en) | 2020-12-01 |
| CN112016097B true CN112016097B (en) | 2024-02-27 |
Family
ID=73503285
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010889524.6A Active CN112016097B (en) | 2020-08-28 | 2020-08-28 | A method to predict when network security vulnerabilities will be exploited |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112016097B (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114021149B (en) * | 2021-11-17 | 2022-06-03 | 山东云天安全技术有限公司 | System for predicting industrial control network bugs based on correction parameters |
| CN113792300B (en) * | 2021-11-17 | 2022-02-11 | 山东云天安全技术有限公司 | System for predicting industrial control network bugs based on internet and industrial control network bug parameters |
| CN114329500B (en) * | 2022-03-09 | 2022-06-17 | 山东卓朗检测股份有限公司 | Server cluster security vulnerability detection method based on artificial intelligence |
| CN116342928B (en) * | 2023-01-18 | 2025-10-31 | 齐鲁工业大学(山东省科学院) | Interpretable fine-granularity image classification method and system based on improved neural prototype tree |
| CN116980065B (en) * | 2023-08-17 | 2024-03-19 | 辽宁天衡智通防务科技有限公司 | Clock calibration method, clock calibration device, terminal equipment and storage medium |
| CN119622742A (en) * | 2024-11-29 | 2025-03-14 | 中国人寿保险股份有限公司 | Vulnerability exploitation time prediction method, device, computer equipment and storage medium |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001090921A2 (en) * | 2000-05-25 | 2001-11-29 | Kanisa, Inc. | System and method for automatically classifying text |
| CN102185735A (en) * | 2011-04-26 | 2011-09-14 | 华北电力大学 | Network security situation prediction method |
| CN104809226A (en) * | 2015-05-07 | 2015-07-29 | 武汉大学 | A Method for Early Classification of Imbalanced Multivariate Time Series Data |
| CN109347801A (en) * | 2018-09-17 | 2019-02-15 | 武汉大学 | A vulnerability exploitation risk assessment method based on multi-source word embedding and knowledge graph |
| CN110018670A (en) * | 2019-03-28 | 2019-07-16 | 浙江大学 | A kind of industrial process unusual service condition prediction technique excavated based on dynamic association rules |
| WO2019150343A1 (en) * | 2018-02-05 | 2019-08-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Resource needs prediction in virtualized systems: generic proactive and self-adaptive solution |
| CN110109969A (en) * | 2019-04-16 | 2019-08-09 | 公安部第三研究所 | A kind of integrated data stream method for digging and system for the unbalanced application of class |
| CN110321940A (en) * | 2019-06-24 | 2019-10-11 | 清华大学 | The feature extraction of aircraft telemetry and classification method and device |
| CN110636020A (en) * | 2019-08-05 | 2019-12-31 | 北京大学 | A Neural Network Equalization Method for Adaptive Communication System |
| CN111401808A (en) * | 2020-03-12 | 2020-07-10 | 重庆文理学院 | Material agreement inventory demand prediction method based on hybrid model |
-
2020
- 2020-08-28 CN CN202010889524.6A patent/CN112016097B/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001090921A2 (en) * | 2000-05-25 | 2001-11-29 | Kanisa, Inc. | System and method for automatically classifying text |
| CN102185735A (en) * | 2011-04-26 | 2011-09-14 | 华北电力大学 | Network security situation prediction method |
| CN104809226A (en) * | 2015-05-07 | 2015-07-29 | 武汉大学 | A Method for Early Classification of Imbalanced Multivariate Time Series Data |
| WO2019150343A1 (en) * | 2018-02-05 | 2019-08-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Resource needs prediction in virtualized systems: generic proactive and self-adaptive solution |
| CN109347801A (en) * | 2018-09-17 | 2019-02-15 | 武汉大学 | A vulnerability exploitation risk assessment method based on multi-source word embedding and knowledge graph |
| CN110018670A (en) * | 2019-03-28 | 2019-07-16 | 浙江大学 | A kind of industrial process unusual service condition prediction technique excavated based on dynamic association rules |
| CN110109969A (en) * | 2019-04-16 | 2019-08-09 | 公安部第三研究所 | A kind of integrated data stream method for digging and system for the unbalanced application of class |
| CN110321940A (en) * | 2019-06-24 | 2019-10-11 | 清华大学 | The feature extraction of aircraft telemetry and classification method and device |
| CN110636020A (en) * | 2019-08-05 | 2019-12-31 | 北京大学 | A Neural Network Equalization Method for Adaptive Communication System |
| CN111401808A (en) * | 2020-03-12 | 2020-07-10 | 重庆文理学院 | Material agreement inventory demand prediction method based on hybrid model |
Non-Patent Citations (5)
| Title |
|---|
| Fast Sliding Window Classification with Convolutional Neural Networks;Henry G. R. Gouk,Anthony M. Blake;《Proceedings of the 29th International Conference on Image and Vision Computing New Zealand》;114-118 * |
| 基于ASP.NET学生选课系统的设计与实现;雷丽;《重庆文理学院学报 自然科学版》(第2期);72-74+77 * |
| 基于类别非平衡时序数据批的企业财务困境预测动态建模研究;刘欣;《中国优秀硕士学位论文全文数据库 经济与管理科学辑》(第02期);J152-3485 * |
| 概念漂移数据流分类算法研究;孙艳歌;《中国博士学位论文全文数据库 信息科技辑》(第01期);I138-41 * |
| 类别严重不均衡应用的在线数据流学习算法;赵强利,蒋艳凰;《计算机科学》(第06期);255-259 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112016097A (en) | 2020-12-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112016097B (en) | A method to predict when network security vulnerabilities will be exploited | |
| US11194691B2 (en) | Anomaly detection using deep learning models | |
| US11005872B2 (en) | Anomaly detection in cybersecurity and fraud applications | |
| CN111144542B (en) | Oil well productivity prediction methods, devices and equipment | |
| CN111163057A (en) | A user identification system and method based on heterogeneous information network embedding algorithm | |
| CN110381079B (en) | A network log anomaly detection method combined with GRU and SVDD | |
| CN117461032A (en) | Abnormality detection system and method | |
| Ding et al. | Towards backdoor attack on deep learning based time series classification | |
| CN115017513A (en) | A smart contract vulnerability detection method based on artificial intelligence | |
| CN120806570B (en) | A method and system for dynamic control of building thermal balance based on load forecasting | |
| Huo et al. | Traffic anomaly detection method based on improved GRU and EFMS-Kmeans clustering | |
| Sheng et al. | Network traffic anomaly detection method based on chaotic neural network | |
| CN119599675A (en) | A deep learning-based anti-fraud model training method | |
| Preethi et al. | Leveraging network vulnerability detection using improved import vector machine and Cuckoo search based Grey Wolf Optimizer | |
| CN116647374B (en) | A network traffic intrusion detection method based on big data | |
| CN120726538A (en) | A method and system for detecting credible content of video generation | |
| CN119379324B (en) | Cost evaluation model generation method and device and cost evaluation method and device | |
| Shukla et al. | Sentiment analysis of international relations with artificial intelligence | |
| Dang et al. | seq2graph: Discovering dynamic dependencies from multivariate time series with multi-level attention | |
| CN118869292B (en) | A domain name management method and device | |
| CN117714121A (en) | Abnormal data dynamic detection method, device, equipment and storage medium | |
| Tenis | Modelling of an Adaptive Network Model for Phishing Website Detection Using Learning Approaches. | |
| CN115659808A (en) | Method and device for predicting residual service life of equipment | |
| Liu et al. | Supervised group embedding for rumor detection in social media | |
| CN115412337B (en) | A method for concept drift detection and adaptation and IoT security system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20240126 Address after: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province Applicant after: Shenzhen Hongyue Information Technology Co.,Ltd. Country or region after: China Address before: 402160, Honghe Avenue, Yongchuan District, Chongqing, 319 Applicant before: CHONGQING University OF ARTS AND SCIENCES Country or region before: China |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20240711 Address after: Room 104, 1st to 5th Floor, Building 17, No. 26 Outer Ring West Road, Fengtai District, Beijing 100070 Patentee after: Beijing Lingcheng Technology Co.,Ltd. Country or region after: China Address before: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province Patentee before: Shenzhen Hongyue Information Technology Co.,Ltd. Country or region before: China |