Research of buffer overflow vulnerabilities detection based on novel K-means clustering

被引:0
|
作者
Cao, Laicheng [1 ]
Su, Xiangqian [1 ]
Wu, Youxiao [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
来源
关键词
Buffer overflows - Clustering - Data sequences - Feature similarities - Higher efficiency - K-means clustering - Path constraint - Vulnerabilities minings;
D O I
10.12733/jcis13520
中图分类号
学科分类号
摘要
In order to excavate the vulnerabilities of buffer overflow and ensure the safety of the software itself, a kind of buffer overflow vulnerabilities mining method based on novel K-means clustering is proposed. We utilize relevant theories of the buffer to analyze the initial sets of test data collected on the basis of feature similarity and path constraint weights, and then combine with the initial data sequence similarity and path constraint weights to make a higher accuracy and lower non-response rates. This method improves the efficiency of discovering buffer overflow vulnerabilities. The experiment results also show that higher efficiency in the aspect of buffer overflow detection has obtained compared with a series of other experiments. 1553-9105/Copyright © 2015 Binary Information Press
引用
收藏
页码:1453 / 1461
相关论文
共 50 条
  • [21] K-means clustering methods with influence detection
    Cheng, R
    Milligan, GW
    EDUCATIONAL AND PSYCHOLOGICAL MEASUREMENT, 1996, 56 (05) : 833 - 838
  • [22] K-means clustering with multiresolution peak detection
    Yu, Guanshan
    Soh, Leen-Kiat
    Bond, Alan
    2005 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT 2005), 2005, : 122 - 127
  • [23] A Novel ELM K-Means Algorithm for Clustering
    Alshamiri, Abobakr Khalil
    Surampudi, Bapi Raju
    Singh, Alok
    SWARM, EVOLUTIONARY, AND MEMETIC COMPUTING, SEMCCO 2014, 2015, 8947 : 212 - 222
  • [24] Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
    Pasupulati, A
    Coit, J
    Levitt, K
    Wu, SF
    Li, SH
    Kuo, JC
    Fan, KP
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 235 - 248
  • [25] A Novel Architecture for k-means Clustering Algorithm
    Khawaja, S. G.
    Khan, Asad Mansoor
    Akram, M. Usman
    Khan, Shoab A.
    PROCEEDINGS OF THE THIRD INTERNATIONAL AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT-AECIA 2016, 2018, 565 : 311 - 320
  • [26] A novel method for K-means clustering algorithm
    Zhao, Jinguo, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [27] A novel high-quality community detection algorithm based on modified K-means clustering
    Li, Jingyong
    Huang, Lan
    Bai, Tian
    Wang, Zhe
    International Journal of Advancements in Computing Technology, 2012, 4 (11) : 248 - 256
  • [28] A novel melanoma detection model: adapted K-means clustering-based segmentation process
    Sukanya, S. T.
    Jerine
    BIO-ALGORITHMS AND MED-SYSTEMS, 2021, 17 (02) : 103 - 118
  • [29] Research on image fusion algorithm based on K-means clustering and NSCT
    Wang, Xinsai
    Feng, Weiqiang
    Feng, Xiaoer
    SEVENTH SYMPOSIUM ON NOVEL PHOTOELECTRONIC DETECTION TECHNOLOGY AND APPLICATIONS, 2021, 11763
  • [30] Research on Fixed Traffic Bottleneck of K-means Clustering based on Hadoop
    Gao, Weiwei
    Li, Xiaofeng
    Li, Dong
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 351 - 354