Distributed code behavior vulnerability with nano science fuzzy scanning algorithm based on machine learning

被引:1
|
作者
Su, Wenwei [1 ]
Ma, Wen [1 ]
机构
[1] Yunnan Power Grid Co Ltd, Informat Ctr, Kunming 650000, Yunnan, Peoples R China
关键词
Machine learning; Principal component analysis; P2P network structure; Distributed code; Behavior vulnerability; Fuzzy scanning;
D O I
10.1007/s13204-021-02119-5
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In view of the fact that the distributed code behavior vulnerability fuzzy scanning algorithm does not consider the vulnerability feature selection method, which leads to the low accuracy and long scanning time of distributed code behavior vulnerability fuzzy scanning. A distributed code behavior vulnerability fuzzy scanning algorithm based on machine learning is proposed. According to the characteristics of kernel principal component analysis, this paper compares the effects of different kernel functions, obtains the vulnerability feature selection method and kernel function, finds the most suitable feature mapping, and transforms it into a feature sample set. In depth study of vulnerability scanning technology, combined with the characteristics of P2P network structure and vulnerability scanning, the distributed code behavior vulnerability fuzzy scanning model is constructed. Each scanning node cooperates with each other to complete the scanning task issued by the user, and the node join and exit mechanism are designed to seek the optimal scheduling matrix of the scanning task set, complete the vulnerability scanning task scheduling, and realize the distributed code line fuzzy scan for vulnerabilities. Experimental results show that the proposed algorithm has high accuracy and can effectively shorten the vulnerability scanning time.
引用
收藏
页码:2073 / 2081
页数:9
相关论文
共 50 条
  • [1] Distributed code behavior vulnerability with nano science fuzzy scanning algorithm based on machine learning
    Wenwei Su
    Wen Ma
    Applied Nanoscience, 2023, 13 : 2073 - 2081
  • [2] A Distributed Vulnerability Scanning on Machine Learning
    Tian, Xiaopeng
    Tang, Di
    2019 6TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2019), 2019, : 32 - 35
  • [3] Vulnerability Prediction From Source Code Using Machine Learning
    Bilgin, Zeki
    Ersoy, Mehmet Akif
    Soykan, Elif Ustundag
    Tomur, Emrah
    Comak, Pinar
    Karacay, Leyli
    IEEE ACCESS, 2020, 8 : 150672 - 150684
  • [4] Fuzzy controller for AUV robots based on machine learning and genetic algorithm
    Toya Yamada
    Hiroshi Kinjo
    Kunihiko Nakazono
    Naoki Oshiro
    Eiho Uezato
    Artificial Life and Robotics, 2023, 28 : 632 - 641
  • [5] Fuzzy controller for AUV robots based on machine learning and genetic algorithm
    Yamada, Toya
    Kinjo, Hiroshi
    Nakazono, Kunihiko
    Oshiro, Naoki
    Uezato, Eiho
    ARTIFICIAL LIFE AND ROBOTICS, 2023, 28 (03) : 632 - 641
  • [6] Botnet Vulnerability Intelligence Clustering Classification Mining and Countermeasure Algorithm Based on Machine Learning
    Chu, Zenan
    Han, Yi
    Zhao, Kai
    IEEE ACCESS, 2019, 7 : 182309 - 182319
  • [7] ANCFIS-ELM: A Machine Learning Algorithm based on Complex Fuzzy Sets
    Yazdanbakhsh, Omolbanin
    Dick, Scott
    2016 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2016, : 2007 - 2013
  • [8] Data science analysis of Vassiliev invariants and knot similarity based on distributed machine learning
    Huo, Chenggang
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (05) : 1 - 13
  • [9] Machine Learning Methods for Improving Vulnerability Detection in Low-level Code
    Letychevskyi, Oleksandr
    Hryniuk, Yaroslav
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5750 - 5752
  • [10] Review on Application of Machine learning Algorithm for Data Science
    Dalal, Kushal Rashmikant
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 270 - 273