Software Security Testing Model Based on Data Mining

Xinyu Zhang
{"title":"Software Security Testing Model Based on Data Mining","authors":"Xinyu Zhang","doi":"10.1109/IHMSC55436.2022.00012","DOIUrl":null,"url":null,"abstract":"Since computers have entered into various fields of daily social life, the reliability and security of computer systems are of significant importance to various fields. The discovery of software security defects is a step-by-step exploration process. Summarizing software security defects is a dynamic process. With the continuous emergence of new software technologies, typical software security defects in different periods may change. The purpose of this paper is to study the software security testing model based on the technology of data mining. Based on the software security testing model foresaid, a testing framework is proposed to guide software security testing. First and foremost, analyze the software interface to obtain static information, for example, parameters; In the second place, dig out the specifications of software requirements according to the obtained parameters, and get efficient component methods and post conditional sequence set. After that, create a set of test cases to test the project and dynamically monitor the information generated by the test, then get the trace set, analyze the trace set, and finally get the security vulnerabilities of the project. After two sets of use-case tests, we can see that the system has found all existing defects in the second regression test.","PeriodicalId":447862,"journal":{"name":"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IHMSC55436.2022.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Since computers have entered into various fields of daily social life, the reliability and security of computer systems are of significant importance to various fields. The discovery of software security defects is a step-by-step exploration process. Summarizing software security defects is a dynamic process. With the continuous emergence of new software technologies, typical software security defects in different periods may change. The purpose of this paper is to study the software security testing model based on the technology of data mining. Based on the software security testing model foresaid, a testing framework is proposed to guide software security testing. First and foremost, analyze the software interface to obtain static information, for example, parameters; In the second place, dig out the specifications of software requirements according to the obtained parameters, and get efficient component methods and post conditional sequence set. After that, create a set of test cases to test the project and dynamically monitor the information generated by the test, then get the trace set, analyze the trace set, and finally get the security vulnerabilities of the project. After two sets of use-case tests, we can see that the system has found all existing defects in the second regression test.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于数据挖掘的软件安全测试模型
由于计算机已进入日常社会生活的各个领域,计算机系统的可靠性和安全性对各个领域都具有重要意义。软件安全缺陷的发现是一个循序渐进的探索过程。总结软件安全缺陷是一个动态的过程。随着软件新技术的不断涌现,不同时期典型的软件安全缺陷可能会发生变化。本文的目的是研究基于数据挖掘技术的软件安全测试模型。在上述软件安全测试模型的基础上,提出了一个指导软件安全测试的测试框架。首先对软件界面进行分析,获取静态信息,如参数;其次,根据得到的参数挖掘出软件需求的规格,得到有效的构件方法和后置条件序列集。之后,创建一组测试用例对项目进行测试,并动态监控测试产生的信息,然后获得跟踪集,分析跟踪集,最后得到项目的安全漏洞。在两组用例测试之后,我们可以看到系统在第二次回归测试中发现了所有存在的缺陷。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IHMSC 2022 Reviewers Research on Camera Calibration of Binocular Vision System Based on Halcon RGB-D SLAM Method Based on Object Detection and K-Means A Lottery-based Spherical Evolution Algorithm with Elite Retention Strategy Research on Anti-condensation Design of Charging Equipments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1