A Software Vulnerability Detection Method Based on Complex Network Community

被引:1
|
作者
Shan, Chun [1 ]
Gong, Yinghui [1 ]
Xiong, Ling [1 ]
Liao, Shuyan [2 ]
Wang, Yuyang [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing Key Lab Software Secur Engn Technol, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2022/3024731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To find out whether there is any vulnerability in software programs where conditional judgment is ignored, this article proposes a software vulnerability detection method based on complex network community. First, the method abstracts the software system into a directed weighted graph by using the software algebraic component model and then preprocesses the directed weighted graph to get a complex network graph. Then, by using the partition algorithm, the complex network graph is divided into the communities, and the key nodes in communities are found by nRank algorithm. Finally, the graph of the key nodes with high influence is matched with the complex network graph that has been preprocessed. In order to evaluate the effectiveness of the community partition algorithm and the nRank algorithm, comparative experiments are carried out on two datasets. The experimental results show that the community partition algorithm is better than the comparison algorithm in precision, recall, and comprehensive evaluation index, and the nRank algorithm is closer to the result of degree centrality measurement index than the PageRank algorithm and the LeaderRank algorithm. The spring-shiro-training project is used to verify the vulnerability detection method based on complex network community, and the results show that the method is effective.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Community Detection in Aviation Network Based on K-means and Complex Network
    He, Hang
    Zhao, Zhenhan
    Luo, Weiwei
    Zhang, Jinghui
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (02): : 251 - 264
  • [42] A Software Assessment Method Based on Relevance Vulnerability
    Miao, Xudong
    Wang, Yongchun
    Cao, Xingchen
    Qu, Binbin
    Jiang, Sheng
    Fang, Feng
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 424 - 427
  • [43] Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
    Wei, Shengjun
    Zhong, Hao
    Shan, Chun
    Ye, Lin
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [44] A Method of Node Layout of a Complex Network Based on Community Compression
    Liu, Chengxiang
    Xiong, Wei
    Zhang, Xitao
    Liu, Zheng
    FUTURE INTERNET, 2019, 11 (12):
  • [45] A novel transmission line vulnerability evaluation method based on complex network theory
    Du Zhi
    Wang Gang
    You Dahai
    Chen Weihua
    Wang Ke
    Zou Yang
    CURRENT DEVELOPMENT OF MECHANICAL ENGINEERING AND ENERGY, PTS 1 AND 2, 2014, 494-495 : 1866 - +
  • [46] Software Vulnerability Detection Method Based on Code Property Graph and Bi-GRU
    Xiao T.
    Guan J.
    Jian S.
    Ren Y.
    Zhang J.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1668 - 1685
  • [47] Reliability Evaluation Method of Complex Software Based on Weighted Network Model
    Wei, Jing
    Guo, Baolong
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP), 2018, : 567 - 571
  • [48] Community Detection Method for Complex Power Optical Fiber Network Based on Improved Local Edge Centrality
    Jiang, Wan-Chang
    Wan, Chao-Yi
    Wang, Sheng-Da
    Guo, Jian
    Liu, Dan-Ni
    Journal of Network Intelligence, 2023, 8 (01): : 17 - 34
  • [49] A Method for Community Detection of Complex Networks Based on Hierarchical Clustering
    Yin, Chuantao
    Zhu, Shuaibing
    Chen, Hui
    Zhang, Bingxue
    David, Bertrand
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [50] E-GVD: Efficient Software Vulnerability Detection Techniques Based on Graph Neural Network
    Wang, Haiye
    Qu, Zhiguo
    Sun, Le
    EAI Endorsed Transactions on Scalable Information Systems, 2024, 11 (06) : 1 - 9