Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology
Guardado en:
| Publicado en: | Discover Artificial Intelligence vol. 5, no. 1 (Dec 2025), p. 120 |
|---|---|
| Autor principal: | |
| Otros Autores: | , , |
| Publicado: |
Springer Nature B.V.
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3223883911 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2731-0809 | ||
| 024 | 7 | |a 10.1007/s44163-025-00347-0 |2 doi | |
| 035 | |a 3223883911 | ||
| 045 | 2 | |b d20251201 |b d20251231 | |
| 100 | 1 | |a Xiao, Peng |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) | |
| 245 | 1 | |a Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology | |
| 260 | |b Springer Nature B.V. |c Dec 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a The current static detection method of network source code vulnerabilities mainly relies on the static analysis of binary code. However, due to the failure to fully simulate the actual operating environment of programs, some vulnerabilities that trigger only under specific conditions are difficult to be found by static detection tools. This limitation increases the difficulty of static analysis. Therefore, a static detection method for multilevel network source code vulnerability based on knowledge graph technology is proposed. Web crawler technology is selected to collect and preprocess vulnerability data to avoid interference from network environment and malicious programs, which leads to redundancy and abnormal vulnerability data. By introducing knowledge graph information and combining word embedding with knowledge embedding, named entities are automatically identified from the preprocessed vulnerability data set. While adopting the joint embedding technology, we can integrate the word embedding and knowledge embedding more effectively, introducing an attention mechanism to enhance the weight of key information. Improve the effectiveness of the named entity identification. The identified named entities are taken as the basic nodes in the knowledge graph to build the multi-level network source code vulnerability knowledge graph, calculate the vulnerability attack error and attack loss, and quantitatively evaluate the accuracy of detection and the potential harm of vulnerabilities. The experimental results show that the proposed method can accurately detect the identification of named entities and vulnerabilities, and has certain positive significance to ensure the network security. | |
| 653 | |a Machine learning | ||
| 653 | |a Data collection | ||
| 653 | |a Datasets | ||
| 653 | |a Knowledge | ||
| 653 | |a Neural networks | ||
| 653 | |a Semantics | ||
| 700 | 1 | |a Zhang, Lina |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) | |
| 700 | 1 | |a Yan, Ying |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) | |
| 700 | 1 | |a Zhang, Zhenhong |u Information Center of China Southern Power Grid Yunnan Power Grid Co., Ltd., Kunming, China (GRID:grid.454193.e) (ISNI:0000 0004 1789 3597) | |
| 773 | 0 | |t Discover Artificial Intelligence |g vol. 5, no. 1 (Dec 2025), p. 120 | |
| 786 | 0 | |d ProQuest |t Research Library | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3223883911/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3223883911/fulltext/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3223883911/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |