{"title":"基于深度学习的电网系统漏洞智能渗透技术","authors":"Liang Chen, Jie Li, Bocheng Zhang","doi":"10.1109/CBFD52659.2021.00048","DOIUrl":null,"url":null,"abstract":"At present, there are some security risks existing in power web system, such as large number of systems, low efficiency of vulnerability identification, poor intelligence level of vulnerability penetration and so on. To solve the problems, this paper studies parallel crawler and multithreaded crawler scanning technology to effectively improve the code and data crawling speed of power web system, so as to improve the efficiency of vulnerability scanning identification. Furthermore, the paper studies the decision-making selection technology of vulnerability feature pattern recognition and vulnerability intelligent detection model of power web system based on LSTM, breaks through the key technologies of semi-automatic outlier sample detection and intelligent vulnerability location and identification, effectively improves the efficiency of vulnerability location and identification, and reduces the labor cost in the process of data processing. Then, based on neural network algorithm, combined with expert experience and exploitation characteristics, the combination rules of parallel and chain are trained. Finally, the deep neural network algorithm is used to judge the feasibility of vulnerability exploitation path, eliminate those paths that cannot be successfully attacked, and improve the success of vulnerability exploitation, so as to improve the ability of intelligent discovery of vulnerability risks.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intelligent Penetration Technology of Power Web System Vulnerability Based on Deep Learning\",\"authors\":\"Liang Chen, Jie Li, Bocheng Zhang\",\"doi\":\"10.1109/CBFD52659.2021.00048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At present, there are some security risks existing in power web system, such as large number of systems, low efficiency of vulnerability identification, poor intelligence level of vulnerability penetration and so on. To solve the problems, this paper studies parallel crawler and multithreaded crawler scanning technology to effectively improve the code and data crawling speed of power web system, so as to improve the efficiency of vulnerability scanning identification. Furthermore, the paper studies the decision-making selection technology of vulnerability feature pattern recognition and vulnerability intelligent detection model of power web system based on LSTM, breaks through the key technologies of semi-automatic outlier sample detection and intelligent vulnerability location and identification, effectively improves the efficiency of vulnerability location and identification, and reduces the labor cost in the process of data processing. Then, based on neural network algorithm, combined with expert experience and exploitation characteristics, the combination rules of parallel and chain are trained. Finally, the deep neural network algorithm is used to judge the feasibility of vulnerability exploitation path, eliminate those paths that cannot be successfully attacked, and improve the success of vulnerability exploitation, so as to improve the ability of intelligent discovery of vulnerability risks.\",\"PeriodicalId\":230625,\"journal\":{\"name\":\"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CBFD52659.2021.00048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CBFD52659.2021.00048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intelligent Penetration Technology of Power Web System Vulnerability Based on Deep Learning
At present, there are some security risks existing in power web system, such as large number of systems, low efficiency of vulnerability identification, poor intelligence level of vulnerability penetration and so on. To solve the problems, this paper studies parallel crawler and multithreaded crawler scanning technology to effectively improve the code and data crawling speed of power web system, so as to improve the efficiency of vulnerability scanning identification. Furthermore, the paper studies the decision-making selection technology of vulnerability feature pattern recognition and vulnerability intelligent detection model of power web system based on LSTM, breaks through the key technologies of semi-automatic outlier sample detection and intelligent vulnerability location and identification, effectively improves the efficiency of vulnerability location and identification, and reduces the labor cost in the process of data processing. Then, based on neural network algorithm, combined with expert experience and exploitation characteristics, the combination rules of parallel and chain are trained. Finally, the deep neural network algorithm is used to judge the feasibility of vulnerability exploitation path, eliminate those paths that cannot be successfully attacked, and improve the success of vulnerability exploitation, so as to improve the ability of intelligent discovery of vulnerability risks.