Research of buffer overflow vulnerabilities detection based on novel K-means clustering

被引:0
|
作者
Cao, Laicheng [1 ]
Su, Xiangqian [1 ]
Wu, Youxiao [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
来源
关键词
Buffer overflows - Clustering - Data sequences - Feature similarities - Higher efficiency - K-means clustering - Path constraint - Vulnerabilities minings;
D O I
10.12733/jcis13520
中图分类号
学科分类号
摘要
In order to excavate the vulnerabilities of buffer overflow and ensure the safety of the software itself, a kind of buffer overflow vulnerabilities mining method based on novel K-means clustering is proposed. We utilize relevant theories of the buffer to analyze the initial sets of test data collected on the basis of feature similarity and path constraint weights, and then combine with the initial data sequence similarity and path constraint weights to make a higher accuracy and lower non-response rates. This method improves the efficiency of discovering buffer overflow vulnerabilities. The experiment results also show that higher efficiency in the aspect of buffer overflow detection has obtained compared with a series of other experiments. 1553-9105/Copyright © 2015 Binary Information Press
引用
收藏
页码:1453 / 1461
相关论文
共 50 条
  • [1] A Novel Adaptive Motion Detection based on K-Means Clustering
    Tao, Fan
    Lin-Sheng, Li
    Qi-Chuan, Tian
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 136 - 140
  • [2] Multipath Detection based on K-means Clustering
    Savas, Caner
    Dovis, Fabio
    PROCEEDINGS OF THE 32ND INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2019), 2019, : 3801 - 3811
  • [3] A Novel MapReduce Based k-Means Clustering
    Sinha, Ankita
    Jana, Prasanta K.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 247 - 255
  • [4] A Novel k-means Algorithm for Clustering and Outlier Detection
    Zhou, Yinghua
    Yu, Hong
    Cai, Xuemei
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 476 - +
  • [5] Research on k-means Clustering Algorithm An Improved k-means Clustering Algorithm
    Shi Na
    Liu Xumin
    Guan Yong
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 63 - 67
  • [6] Intrusion Detection Based on MinMax K-means Clustering
    Eslamnezhad, Mohsen
    Varjani, Ali Yazdian
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 804 - 808
  • [7] Research on K-Means clustering algorithm based on HADOOP
    Hu, Feng (272800588@qq.com), 1600, Science and Engineering Research Support Society (09):
  • [8] Research on Network Intrusion Detection System Based on Improved K-means Clustering Algorithm
    Li Tian
    Wang Jianwen
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 76 - 79
  • [9] Intrusion Detection Based on Simulated Annealing and K-means Clustering
    Wu Jian
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 1001 - 1005
  • [10] A novel hierarchical K-means clustering algorithm based on entropy
    Tang, Zhihang
    Li, Rongjun
    Journal of Information and Computational Science, 2010, 7 (14): : 3019 - 3026