首页> 外国专利> SYSTEMS AND METHODS FOR IDENTIFYING INSIDER THREATS IN CODE

SYSTEMS AND METHODS FOR IDENTIFYING INSIDER THREATS IN CODE

机译:用于识别代码内威胁的系统和方法

摘要

In a system for detecting composite vulnerabilities associated with a process or a context, individual defects/vulnerabilities in a software system/application are identified and clustered into two or more classes of defects, where each class includes one or more defects of related types. Given a pattern of defects of different types, where the pattern represents a composite vulnerability, it is determined by searching in the clusters, if the software system/application includes all of the defects/vulnerabilities associated with that pattern.
机译:在用于检测与过程或上下文关联的复合漏洞的系统中,识别软件系统/应用程序中的单个缺陷/漏洞并将其聚集成两类或更多类缺陷,其中每一类包括一个或多个相关类型的缺陷。给定不同类型的缺陷模式,其中该模式表示一个复合漏洞,可以通过在集群中进行搜索来确定软件系统/应用程序是否包括与该模式相关联的所有缺陷/漏洞。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号