DocumentCode :
2463065
Title :
Similar vulnerability query based on text mining
Author :
Yi, Jin ; Wu, Runpu ; Li, Juan ; Xiong, Qi ; Peng, Tao ; Yu, Fajiang ; Yang, Zhenyu ; Han, Bo
Author_Institution :
China Inf. Technol. Security Evaluation Center, Beijing, China
fYear :
2011
fDate :
12-14 Oct. 2011
Firstpage :
339
Lastpage :
342
Abstract :
With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a text mining approach to compute a similarity score between two vulnerabilities based on their text description. It consists of two steps: preprocessing and similarity score computation. Experimental results based on an annotated vulnerability dataset have proved the effectiveness of our approach.
Keywords :
data mining; text analysis; similar vulnerability query; text mining approach; vulnerability management; Educational institutions; Information security; Kernel; Text mining; Vectors; similar vulnerability; similarity calculation; text mining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Information Technologies (ISCIT), 2011 11th International Symposium on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4577-1294-4
Type :
conf
DOI :
10.1109/ISCIT.2011.6089949
Filename :
6089949
Link To Document :
بازگشت