DocumentCode
2463065
Title
Similar vulnerability query based on text mining
Author
Yi, Jin ; Wu, Runpu ; Li, Juan ; Xiong, Qi ; Peng, Tao ; Yu, Fajiang ; Yang, Zhenyu ; Han, Bo
Author_Institution
China Inf. Technol. Security Evaluation Center, Beijing, China
fYear
2011
fDate
12-14 Oct. 2011
Firstpage
339
Lastpage
342
Abstract
With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a text mining approach to compute a similarity score between two vulnerabilities based on their text description. It consists of two steps: preprocessing and similarity score computation. Experimental results based on an annotated vulnerability dataset have proved the effectiveness of our approach.
Keywords
data mining; text analysis; similar vulnerability query; text mining approach; vulnerability management; Educational institutions; Information security; Kernel; Text mining; Vectors; similar vulnerability; similarity calculation; text mining;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Information Technologies (ISCIT), 2011 11th International Symposium on
Conference_Location
Hangzhou
Print_ISBN
978-1-4577-1294-4
Type
conf
DOI
10.1109/ISCIT.2011.6089949
Filename
6089949
Link To Document