首页> 外文会议>International Conference on Intelligent Information Hiding and Multimedia Signal Processing >Research on parallel vulnerabilities discovery based on open source database and text mining
【24h】

Research on parallel vulnerabilities discovery based on open source database and text mining

机译:基于开源数据库和文本挖掘的并行漏洞发现

获取原文

摘要

For the question of information security vulnerabilities discovery, the parallel vulnerabilities discovery method is given based on the CAPEC, CWE, CVE and other open source database and text mining. Firstly, we can extract the association vulnerability CWE under the same attack mode, then from CWE associated with CVE based on open source database. That can help us to analyze the potential parallel relationship of the multiple vulnerabilities. Secondly, the vulnerability description information will be vectorized, so that the software system is able to intelligent processing to vulnerability data. That is different from the query based on keyword matching, analyzes the similarity between the multiple vulnerabilities according to the threshold from the training set, and computes the parallel relationship between the multiple vulnerabilities and discovery the parallel vulnerabilities. Finally, this method is correct and effective by the experimental verification and in practice. According to this method, we are able to repair other parallel vulnerabilities when finding a vulnerability is exploited. An advantage of our method is that is applied to network defense.
机译:对于信息安全漏洞发现的问题的基础上,CAPEC,CWE,CVE和其他开源数据库和文本挖掘给出并行漏洞发现方法。首先,我们可以在同一个攻击模式下提取的相关漏洞CWE,然后从CVE相关CWE基于开源数据库上。这可以帮助我们分析多个漏洞的潜在平行关系。其次,漏洞描述信息将被矢量化,使软件系统能够智能的处理漏洞数据。即从基于关键字匹配查询不同,分析根据从训练集合中的阈值的多个漏洞之间的相似性,并计算多个漏洞和发现并行漏洞之间的平行关系。最后,这种方法是正确的,并通过实验验证,并在实践中有效。根据这种方法,我们可以发现一个漏洞被利用时,维修其它平行的漏洞。我们的方法的优点是适用于网络防御。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号