skip to main content
10.1145/3177457.3191709acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmsConference Proceedingsconference-collections
research-article

Research on Defect Detection Technology of Trusted Behavior Decision Tree Based on Intelligent Data Semantic Analysis of Massive Data

Published:08 January 2018Publication History

ABSTRACT

With the rapid development of information technology, software systems' scales and complexity are showing a trend of expansion. The users' needs for the software security, software security reliability and software stability are growing increasingly. At present, the industry has applied machine learning methods to the fields of defect detection to repair and improve software defects through the massive data intelligent semantic analysis or code scanning. The model in machine learning is faced with big difficulty of model building, understanding, and the poor visualization in the field of traditional software defect detection. In view of the above problems, we present a point of view that intelligent semantic analysis technology based on massive data, and using the trusted behavior decision tree model to analyze the soft behavior by layered detection technology. At the same time, it is equipped related test environment to compare the tested software. The result shows that the defect detection technology based on intelligent semantic analysis of massive data is superior to other techniques at the cost of building time and error reported ratio.

References

  1. Yuan Jiang, Ming Li and Zhihua Zhou."Software Defect Detection with ROCUS." Journal of Computer Science & Technology, 2011(02): p. 328--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chao Li."Concurrent Program Defect Detection Technology Based on Sequence Pattern Mining." Computer Science, 2015(Z11).Google ScholarGoogle Scholar
  3. Lei Tang, Chunping Li and Liu Yang. "Statistical Strategy Sequence Pattern Mining and Its Application in Software Defect Prediction."2013. 40(5): p. 164--167.Google ScholarGoogle Scholar
  4. Ran Yin. "Research on Software Defect Prediction Model Based on SAPSO - BP Network."2014, Southwest University.Google ScholarGoogle Scholar
  5. Xiaoan Bao, Xiaoming Xie, Na Zhang, Jian Wen Cao and Ning Gui." Software Optimization Strategy of Markov Model Based on Defect Correlation Degree." Journal of Software, 2015. 26(1): p. 14--25.Google ScholarGoogle Scholar
  6. Cuifang Zheng. "Research and Application of Software Defect Prediction Technology Based on Bayesian Network." 2006, China Academy of Engineering Physics.Google ScholarGoogle Scholar
  7. Xiuxiang Zhao, Yong Shi, Ying Liu and Lingling Zhang. "The Application of Text Classification in Software Defect Management."2009.Google ScholarGoogle Scholar
  8. Hu Lu, Yuqing Song, Wanyu Xue and Jing Xu. "An Analysis Method of Protocol Analysis Based on Regular Expression Matching." Computer Applications and Software, 2008. 25(3): p. 89--90.Google ScholarGoogle Scholar
  9. Fang Liu, Xing Gao, Bing Zhou and Juan Deng. "Software Defect Prediction Model Based on PCA - ISVM.", Computer Simulation, 2014(03): p. 397--401.Google ScholarGoogle Scholar
  10. Wencong Huang, Xiaoyuan Jing, Yongfang Yao and Fei Wu. "Software Defect Detection Based on Integrated Learning." Computer Technology and Development, 2015(10): p. 63--66.Google ScholarGoogle Scholar
  11. Kouwu Wang, Junming Zhang, Shigong Long and Fang Dong. "Research on Model Detection Algorithm Based on FSA." Journal of Guizhou University (Natural Science), 2012(05): p. 58--62.Google ScholarGoogle Scholar
  12. Li Jun Liu and Jinpeng Huai. "Research and Implementation of Network Scanning Detection Algorithm Based on Finite Automata." Journal of Computer Research and Development, 2006(03): p. 417--422.Google ScholarGoogle ScholarCross RefCross Ref
  13. Wen Li, Yingxia Dai, Yifeng Lian and Pinghui Feng. "Context-Dependent Host Intrusion Detection System Based on Hybrid Model." Journal of Software, 2009(01): p. 138--151.Google ScholarGoogle ScholarCross RefCross Ref
  14. Dandan Zhou and Xianguo Li. "Research on Software Defect Detection Model Based on Static Detection Tool." Computer and Modernization, 2012(11): p. 55--58.Google ScholarGoogle Scholar
  15. Lizhi Zhu. "A Misuse Detection Algorithm Based on Decision System and Decision Tree". Computer and Digital Engineering, 2016, 44(12):2353--2355.Google ScholarGoogle Scholar
  16. Weiwei Huang, Jianwei Ye and Hongli Zhang. "Research on Dynamic Detection Technology of Trojan Based on ID3 Decision Tree" Intelligent Computer and Application, 2011, 01(3):32--34.Google ScholarGoogle Scholar
  17. Gen Li. "Research on Binary Software Defect Automatic Mining Technology Based on Dynamic Test Cases " National University of Defense Technology, 2010.Google ScholarGoogle Scholar

Index Terms

  1. Research on Defect Detection Technology of Trusted Behavior Decision Tree Based on Intelligent Data Semantic Analysis of Massive Data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCMS '18: Proceedings of the 10th International Conference on Computer Modeling and Simulation
      January 2018
      310 pages
      ISBN:9781450363396
      DOI:10.1145/3177457

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 January 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader