基于数据挖掘的软件安全测试模型

Xinyu Zhang
{"title":"基于数据挖掘的软件安全测试模型","authors":"Xinyu Zhang","doi":"10.1109/IHMSC55436.2022.00012","DOIUrl":null,"url":null,"abstract":"Since computers have entered into various fields of daily social life, the reliability and security of computer systems are of significant importance to various fields. The discovery of software security defects is a step-by-step exploration process. Summarizing software security defects is a dynamic process. With the continuous emergence of new software technologies, typical software security defects in different periods may change. The purpose of this paper is to study the software security testing model based on the technology of data mining. Based on the software security testing model foresaid, a testing framework is proposed to guide software security testing. First and foremost, analyze the software interface to obtain static information, for example, parameters; In the second place, dig out the specifications of software requirements according to the obtained parameters, and get efficient component methods and post conditional sequence set. After that, create a set of test cases to test the project and dynamically monitor the information generated by the test, then get the trace set, analyze the trace set, and finally get the security vulnerabilities of the project. After two sets of use-case tests, we can see that the system has found all existing defects in the second regression test.","PeriodicalId":447862,"journal":{"name":"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Software Security Testing Model Based on Data Mining\",\"authors\":\"Xinyu Zhang\",\"doi\":\"10.1109/IHMSC55436.2022.00012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since computers have entered into various fields of daily social life, the reliability and security of computer systems are of significant importance to various fields. The discovery of software security defects is a step-by-step exploration process. Summarizing software security defects is a dynamic process. With the continuous emergence of new software technologies, typical software security defects in different periods may change. The purpose of this paper is to study the software security testing model based on the technology of data mining. Based on the software security testing model foresaid, a testing framework is proposed to guide software security testing. First and foremost, analyze the software interface to obtain static information, for example, parameters; In the second place, dig out the specifications of software requirements according to the obtained parameters, and get efficient component methods and post conditional sequence set. After that, create a set of test cases to test the project and dynamically monitor the information generated by the test, then get the trace set, analyze the trace set, and finally get the security vulnerabilities of the project. After two sets of use-case tests, we can see that the system has found all existing defects in the second regression test.\",\"PeriodicalId\":447862,\"journal\":{\"name\":\"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)\",\"volume\":\"211 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IHMSC55436.2022.00012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IHMSC55436.2022.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于计算机已进入日常社会生活的各个领域,计算机系统的可靠性和安全性对各个领域都具有重要意义。软件安全缺陷的发现是一个循序渐进的探索过程。总结软件安全缺陷是一个动态的过程。随着软件新技术的不断涌现,不同时期典型的软件安全缺陷可能会发生变化。本文的目的是研究基于数据挖掘技术的软件安全测试模型。在上述软件安全测试模型的基础上,提出了一个指导软件安全测试的测试框架。首先对软件界面进行分析,获取静态信息,如参数;其次,根据得到的参数挖掘出软件需求的规格,得到有效的构件方法和后置条件序列集。之后,创建一组测试用例对项目进行测试,并动态监控测试产生的信息,然后获得跟踪集,分析跟踪集,最后得到项目的安全漏洞。在两组用例测试之后,我们可以看到系统在第二次回归测试中发现了所有存在的缺陷。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Software Security Testing Model Based on Data Mining
Since computers have entered into various fields of daily social life, the reliability and security of computer systems are of significant importance to various fields. The discovery of software security defects is a step-by-step exploration process. Summarizing software security defects is a dynamic process. With the continuous emergence of new software technologies, typical software security defects in different periods may change. The purpose of this paper is to study the software security testing model based on the technology of data mining. Based on the software security testing model foresaid, a testing framework is proposed to guide software security testing. First and foremost, analyze the software interface to obtain static information, for example, parameters; In the second place, dig out the specifications of software requirements according to the obtained parameters, and get efficient component methods and post conditional sequence set. After that, create a set of test cases to test the project and dynamically monitor the information generated by the test, then get the trace set, analyze the trace set, and finally get the security vulnerabilities of the project. After two sets of use-case tests, we can see that the system has found all existing defects in the second regression test.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信