论文标题
部分可观测时空混沌系统的无模型预测
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study
论文作者
论文摘要
目前,对货物生态系统的结构和脆弱性传播的潜力知之甚少。许多实证研究将第三方依赖治理策略从单个软件生态系统推广到其他生态系统,但忽略了不同软件生态系统的技术结构的差异,因此很难将其他生态系统从其他生态系统直接推广到货物生态系统。为了填补该领域的空白,本文使用与知识图有关的技术来构建货物生态系统依赖性漏洞的知识图,以应对这一挑战。本文是相关研究领域的首次大规模实证研究,以解决货物生态系统中脆弱性的传播。本文提出了一种依赖性 - 可变性知识图解析算法,以确定脆弱性传播路径和传播范围,并经验研究货物生态系统中脆弱性的特征,传播范围以及引起脆弱性传播的因素。我们的研究发现,货物生态系统的安全漏洞主要与内存有关。在最新版本的图书馆中,受漏洞影响的图书馆中有18%仍受到漏洞的影响。在整个货物生态系统中,受漏洞传播影响的版本数量为19.78%。本文着眼于触发货物生态系统漏洞的特征和传播因素。它为货物社区管理员,使用货物管理第三方图书馆的开发人员以及图书馆所有者提供了一些实用的解决策略。本文提供了改善货物生态系统整体安全性的新想法。
Currently, little is known about the structure of the Cargo ecosystem and the potential for vulnerability propagation. Many empirical studies generalize third-party dependency governance strategies from a single software ecosystem to other ecosystems but ignore the differences in the technical structures of different software ecosystems, making it difficult to directly generalize security governance strategies from other ecosystems to the Cargo ecosystem. To fill the gap in this area, this paper constructs a knowledge graph of dependency vulnerabilities for the Cargo ecosystem using techniques related to knowledge graphs to address this challenge. This paper is the first large-scale empirical study in a related research area to address vulnerability propagation in the Cargo ecosystem. This paper proposes a dependency-vulnerability knowledge graph parsing algorithm to determine the vulnerability propagation path and propagation range and empirically studies the characteristics of vulnerabilities in the Cargo ecosystem, the propagation range, and the factors that cause vulnerability propagation. Our research has found that the Cargo ecosystem's security vulnerabilities are primarily memory-related. 18% of the libraries affected by the vulnerability is still affected by the vulnerability in the latest version of the library. The number of versions affected by the propagation of the vulnerabilities is 19.78% in the entire Cargo ecosystem. This paper looks at the characteristics and propagation factors triggering vulnerabilities in the Cargo ecosystem. It provides some practical resolution strategies for administrators of the Cargo community, developers who use Cargo to manage third-party libraries, and library owners. This paper provides new ideas for improving the overall security of the Cargo ecosystem.