Application of artificial intelligence technology in the field of security vulnerability
The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial i...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539469396672512 |
---|---|
author | Hongyu SUN Yuan HE Jice WANG Ying DONG Lipeng ZHU He WANG Yuqing ZHANG |
author_facet | Hongyu SUN Yuan HE Jice WANG Ying DONG Lipeng ZHU He WANG Yuqing ZHANG |
author_sort | Hongyu SUN |
collection | DOAJ |
description | The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected. |
format | Article |
id | doaj-art-f0c263d3b14744e8962c69a70442447e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f0c263d3b14744e8962c69a70442447e2025-01-14T07:15:13ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-013911759719794Application of artificial intelligence technology in the field of security vulnerabilityHongyu SUNYuan HEJice WANGYing DONGLipeng ZHUHe WANGYuqing ZHANGThe large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/vulnerability miningmachine learningartificial intelligence |
spellingShingle | Hongyu SUN Yuan HE Jice WANG Ying DONG Lipeng ZHU He WANG Yuqing ZHANG Application of artificial intelligence technology in the field of security vulnerability Tongxin xuebao vulnerability mining machine learning artificial intelligence |
title | Application of artificial intelligence technology in the field of security vulnerability |
title_full | Application of artificial intelligence technology in the field of security vulnerability |
title_fullStr | Application of artificial intelligence technology in the field of security vulnerability |
title_full_unstemmed | Application of artificial intelligence technology in the field of security vulnerability |
title_short | Application of artificial intelligence technology in the field of security vulnerability |
title_sort | application of artificial intelligence technology in the field of security vulnerability |
topic | vulnerability mining machine learning artificial intelligence |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/ |
work_keys_str_mv | AT hongyusun applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT yuanhe applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT jicewang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT yingdong applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT lipengzhu applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT hewang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability AT yuqingzhang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability |