Title :
Similar vulnerability query based on text mining
Author :
Yi, Jin ; Wu, Runpu ; Li, Juan ; Xiong, Qi ; Peng, Tao ; Yu, Fajiang ; Yang, Zhenyu ; Han, Bo
Author_Institution :
China Inf. Technol. Security Evaluation Center, Beijing, China
Abstract :
With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a text mining approach to compute a similarity score between two vulnerabilities based on their text description. It consists of two steps: preprocessing and similarity score computation. Experimental results based on an annotated vulnerability dataset have proved the effectiveness of our approach.
Keywords :
data mining; text analysis; similar vulnerability query; text mining approach; vulnerability management; Educational institutions; Information security; Kernel; Text mining; Vectors; similar vulnerability; similarity calculation; text mining;
Conference_Titel :
Communications and Information Technologies (ISCIT), 2011 11th International Symposium on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4577-1294-4
DOI :
10.1109/ISCIT.2011.6089949