ID |
原文 |
译文 |
45216 |
以人工的方式进行安全漏洞研究的效率较低,无法满足网络空间安全的需要。 |
The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security. |
45217 |
因此,如何将机器学习、自然语言处理等人工智能技术应用于安全漏洞的研究已成为新的热点, |
Therefore, how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot. |
45218 |
人工智能技术能够智能化地处理漏洞信息来辅助安全漏洞研究,同时提高安全漏洞挖掘的效率。 |
Artificial intelligence technology can intelligently process vulnerability information, which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining. |
45219 |
首先分析了安全漏洞的自动化挖掘、自动化评估、自动化利用和自动化修补等关键技术,指出安全漏洞挖掘的自动化是人工智能在安全漏洞领域应用的重点, |
Firstly, the key technologies of automatic mining, automatic assessment, automatic exploitation and automatic repair of security vulnerabilities were analyzed, which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability. |
45220 |
然后分析和归纳了近年来提出的将人工智能技术应用于安全漏洞研究的最新研究成果,指出了应用中的一些问题,给出了相应的解决方案, |
Then, the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years, which pointed out some problems in the application and gave corresponding solutions. |
45221 |
最后展望了安全漏洞智能研究的发展趋势。 |
Finally, the development trend of intelligent re-search on security vulnerabilities was prospected. |
45222 |
拟态安全防御的一个关键环节是异构功能等价体的调度,现有的调度策略缺乏对冗余体间相似度的考虑,且调度算法较为单一。 |
The scheduling of heterogeneous redundancies is one of the key lines of mimic security defense, but the existing scheduling strategies are lack of consideration about the similarity among redundancies and the scheduling algorithms are incomprehensive. |
45223 |
基于此,提出了一种兼顾动态性和可靠性的异构功能等价体调度算法——随机种子最小相似度算法,首先随机确定种子冗余体,然后再根据相似度指标选择整体相似度最小的最终调度方案。 |
A new scheduling algorithm called random seed & minimum similarity (RSMS) algorithm was proposed, which combined dynamics and reliability by determining a scheduling scheme with minimum global-similarity after choosing a seed-redundancy randomly. |
45224 |
理论分析和仿真实验表明,该算法的调度周期远高于最长相异性距离算法,而失效率远低于随机调度算法,在动态性和可靠性之间达到了较好的平衡。 |
Theoretical analysis and simulation results show that RSMS algorithm possessed a far longer scheduling cycle than maximum dissimilarity algorithm, as well as a far lower failure rate than random scheduling algorithm, which represents an effective balance between dynamics and reliability. |
45225 |
软件定义网络(SDN, software defined network)作为一种新兴的网络架构,其安全问题一直是 SDN 领域研究的热点,如 SDN 控制通道安全性、伪造服务部署及外部分布式拒绝服务(DDoS, distributed denial of service)攻击等。 |
Software defined network (SDN) is a new kind of network technology, and the security problems are the hot topics in SDN field, such as SDN control channel security, forged service deployment and external distributed denial of service (DDoS) attacks. |