DocumentCode :
3752516
Title :
Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining
Author :
Zhao Xianghui;Peng Yong;Zhai Zan;Jin Yi;Yao Yuangang
Author_Institution :
Security Evaluation Center, China Inf. Technol., Beijing, China
fYear :
2015
Firstpage :
327
Lastpage :
332
Abstract :
For the question of information security vulnerabilities discovery, the parallel vulnerabilities discovery method is given based on the CAPEC, CWE, CVE and other open source database and text mining. Firstly, we can extract the association vulnerability CWE under the same attack mode, then from CWE associated with CVE based on open source database. That can help us to analyze the potential parallel relationship of the multiple vulnerabilities. Secondly, the vulnerability description information will be vectorized, so that the software system is able to intelligent processing to vulnerability data. That is different from the query based on keyword matching, analyzes the similarity between the multiple vulnerabilities according to the threshold from the training set, and computes the parallel relationship between the multiple vulnerabilities and discovery the parallel vulnerabilities. Finally, this method is correct and effective by the experimental verification and in practice. According to this method, we are able to repair other parallel vulnerabilities when finding a vulnerability is exploited. An advantage of our method is that is applied to network defense.
Keywords :
"Information security","Databases","Text mining","Correlation","Training"
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2015 International Conference on
Type :
conf
DOI :
10.1109/IIH-MSP.2015.84
Filename :
7415823
Link To Document :
بازگشت