Mining evaluation method based on big data vulnerability mining
The invention discloses a mining evaluation method based on big data vulnerability mining, relates to the technical field of mining evaluation, and aims to extract features related to vulnerabilities from collected data, analyze and mine vulnerability modes in the data through a data mining algorith...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a mining evaluation method based on big data vulnerability mining, relates to the technical field of mining evaluation, and aims to extract features related to vulnerabilities from collected data, analyze and mine vulnerability modes in the data through a data mining algorithm, identify potential vulnerabilities, evaluate and analyze mining results, and improve the vulnerability detection accuracy. And determining the severity and potential influence of the vulnerability, and visually displaying the mining result, so that a security team or a manager can better understand and analyze the vulnerability condition, repair the found vulnerability according to suggestions in a report, and verify and test after repair to ensure that the vulnerability is successfully repaired. According to the evaluation method, the potential vulnerabilities in the system are effectively identified, and after the vulnerabilities are repaired, the security of the system is evaluated and verified again, so that |
---|