Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology

Guardado en:
Detalles Bibliográficos
Publicado en:Discover Artificial Intelligence vol. 5, no. 1 (Dec 2025), p. 120
Autor principal: Xiao, Peng
Otros Autores: Zhang, Lina, Yan, Ying, Zhang, Zhenhong
Publicado:
Springer Nature B.V.
Materias:
Acceso en línea:Citation/Abstract
Full Text
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3223883911
003 UK-CbPIL
022 |a 2731-0809 
024 7 |a 10.1007/s44163-025-00347-0  |2 doi 
035 |a 3223883911 
045 2 |b d20251201  |b d20251231 
100 1 |a Xiao, Peng  |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) 
245 1 |a Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology 
260 |b Springer Nature B.V.  |c Dec 2025 
513 |a Journal Article 
520 3 |a The current static detection method of network source code vulnerabilities mainly relies on the static analysis of binary code. However, due to the failure to fully simulate the actual operating environment of programs, some vulnerabilities that trigger only under specific conditions are difficult to be found by static detection tools. This limitation increases the difficulty of static analysis. Therefore, a static detection method for multilevel network source code vulnerability based on knowledge graph technology is proposed. Web crawler technology is selected to collect and preprocess vulnerability data to avoid interference from network environment and malicious programs, which leads to redundancy and abnormal vulnerability data. By introducing knowledge graph information and combining word embedding with knowledge embedding, named entities are automatically identified from the preprocessed vulnerability data set. While adopting the joint embedding technology, we can integrate the word embedding and knowledge embedding more effectively, introducing an attention mechanism to enhance the weight of key information. Improve the effectiveness of the named entity identification. The identified named entities are taken as the basic nodes in the knowledge graph to build the multi-level network source code vulnerability knowledge graph, calculate the vulnerability attack error and attack loss, and quantitatively evaluate the accuracy of detection and the potential harm of vulnerabilities. The experimental results show that the proposed method can accurately detect the identification of named entities and vulnerabilities, and has certain positive significance to ensure the network security. 
653 |a Machine learning 
653 |a Data collection 
653 |a Datasets 
653 |a Knowledge 
653 |a Neural networks 
653 |a Semantics 
700 1 |a Zhang, Lina  |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) 
700 1 |a Yan, Ying  |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) 
700 1 |a Zhang, Zhenhong  |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) 
773 0 |t Discover Artificial Intelligence  |g vol. 5, no. 1 (Dec 2025), p. 120 
786 0 |d ProQuest  |t Research Library 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3223883911/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3223883911/fulltext/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3223883911/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch