Application of Machine Training to Search Vulnerabilities in the Software Code

Author:

Buinevich M.,Zhukovskaya P.,Izrailov K.,Pokussov V.

Abstract

The article considers the possibility of using artificial intelligence in the field of information security. For this, the following domain contradiction was highlighted: sharpening of detection algorithms for specific vulnerabilities in VS code, constant modification of the vulnerability code. To resolve the contradiction, an object is considered – software with vulnerabilities in the process of its development, for the subject – ways of intellectual analysis of its characteristics. A hypothetical solution is proposed through the use of Machine Learning Technology to identify vulnerabilities in software, using a huge amount of accumulated knowledge. Also, possible signs of software representations used for the operation of the Technology are given.

Publisher

Bonch-Bruevich State University of Telecommunications

Reference18 articles.

1. Izrailov K. Analysis of the Security State of Software // II International Scientific and Technical and Methodological Conference «Actual Problems of Infotelecommunications in Science and Education». – SPb.: SUT, 2013. – pp. 874–877.

2. Buinevich M.V., Izrailov K.E., Mostovich D.I., Yaroshenko A.Yu. Problematic Issues of Neutralization of Vulnerabilities in a Software Code of Telecommunication Devices // Problems of Technosphere Risk Management. 2016. No 3 (39). pp. 81–89.

3. Buynevich M. V., Vasilyeva I. N., Vorobyev T. M., Gnidenko I. G., Egorova I. V., Enikeyeva L. A. i dr. Zashchita informatsii v kompyuternykh sistemakh: monografiya. – SPb.: SPGEU. 2017. 163 s.

4. Buynevich M. V., Izrailov K. E., Mostovich D. I. Sravnitelnyy analiz podkhodov k poisku uyazvimostey v programmnom kode // Aktualnyye problemy infotelekommunikatsiy v nauke i obrazovanii (APINO-2016): sbornik nauchnykh statey V Mezhdunarodnoy nauchno-tekhnicheskoy i nauchnometodicheskoy konferentsii. 2016. V. 1. pp. 256–260.

5. Izrailov K. E. Poisk uyazvimostey v razlichnykh predstavleniyakh mashinnogo koda // Informatsionnaya bezopasnost regionov Rossii (IBRR-2015): materialy IKh Sankt-Peterburgskoy mezhregionalnoy konferentsii. 2015. S. 157.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3