• DocumentCode
    2463065
  • Title

    Similar vulnerability query based on text mining

  • Author

    Yi, Jin ; Wu, Runpu ; Li, Juan ; Xiong, Qi ; Peng, Tao ; Yu, Fajiang ; Yang, Zhenyu ; Han, Bo

  • Author_Institution
    China Inf. Technol. Security Evaluation Center, Beijing, China
  • fYear
    2011
  • fDate
    12-14 Oct. 2011
  • Firstpage
    339
  • Lastpage
    342
  • Abstract
    With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a text mining approach to compute a similarity score between two vulnerabilities based on their text description. It consists of two steps: preprocessing and similarity score computation. Experimental results based on an annotated vulnerability dataset have proved the effectiveness of our approach.
  • Keywords
    data mining; text analysis; similar vulnerability query; text mining approach; vulnerability management; Educational institutions; Information security; Kernel; Text mining; Vectors; similar vulnerability; similarity calculation; text mining;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Information Technologies (ISCIT), 2011 11th International Symposium on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4577-1294-4
  • Type

    conf

  • DOI
    10.1109/ISCIT.2011.6089949
  • Filename
    6089949