Third-party component security testing method based on data mining
The invention discloses a third-party component security testing method based on data mining. The method comprises steps as follows: 1, generating a method execution sequence set with a sequence generating algorithm according to effective component method names, method pre-conditions and post-condit...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a third-party component security testing method based on data mining. The method comprises steps as follows: 1, generating a method execution sequence set with a sequence generating algorithm according to effective component method names, method pre-conditions and post-conditions; 2, reading parameter boundary value files, assigning parameters of methods in the method execution sequences with a test case generating algorithm, and generating a test case set; 3, testing the components according to the generated test case set, recording state information during component operation, and generating a monitoring log set; 4, analyzing monitoring logs with a security vulnerability detecting algorithm to obtain a final component security vulnerability test result set. The method provides the model basis and the test criterion for the test of component security vulnerability and can be better applied to component security tests; besides, a third-party component security testing system based on d |
---|