Application of artificial intelligence technology in the field of security vulnerability

The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial i...

Full description

Saved in:
Bibliographic Details
Main Authors: Hongyu SUN, Yuan HE, Jice WANG, Ying DONG, Lipeng ZHU, He WANG, Yuqing ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539469396672512
author Hongyu SUN
Yuan HE
Jice WANG
Ying DONG
Lipeng ZHU
He WANG
Yuqing ZHANG
author_facet Hongyu SUN
Yuan HE
Jice WANG
Ying DONG
Lipeng ZHU
He WANG
Yuqing ZHANG
author_sort Hongyu SUN
collection DOAJ
description The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.
format Article
id doaj-art-f0c263d3b14744e8962c69a70442447e
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f0c263d3b14744e8962c69a70442447e2025-01-14T07:15:13ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-08-013911759719794Application of artificial intelligence technology in the field of security vulnerabilityHongyu SUNYuan HEJice WANGYing DONGLipeng ZHUHe WANGYuqing ZHANGThe large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/vulnerability miningmachine learningartificial intelligence
spellingShingle Hongyu SUN
Yuan HE
Jice WANG
Ying DONG
Lipeng ZHU
He WANG
Yuqing ZHANG
Application of artificial intelligence technology in the field of security vulnerability
Tongxin xuebao
vulnerability mining
machine learning
artificial intelligence
title Application of artificial intelligence technology in the field of security vulnerability
title_full Application of artificial intelligence technology in the field of security vulnerability
title_fullStr Application of artificial intelligence technology in the field of security vulnerability
title_full_unstemmed Application of artificial intelligence technology in the field of security vulnerability
title_short Application of artificial intelligence technology in the field of security vulnerability
title_sort application of artificial intelligence technology in the field of security vulnerability
topic vulnerability mining
machine learning
artificial intelligence
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018137/
work_keys_str_mv AT hongyusun applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT yuanhe applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT jicewang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT yingdong applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT lipengzhu applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT hewang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability
AT yuqingzhang applicationofartificialintelligencetechnologyinthefieldofsecurityvulnerability