Vulnerability automatic classification method supporting vulnerability correlation mining
An automatic classification and correlation technology, applied in the field of information security, can solve problems such as the inability to evaluate the hazard level of vulnerabilities, the lack of specific characteristics, and vague concepts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] The technical solution of the present invention will be described in detail below in conjunction with the drawings and embodiments.
[0079] Using the vulnerability automatic classification method that supports vulnerability association mining proposed by the present invention to classify vulnerabilities and obtain the operation process of the association relationship between vulnerabilities is as follows: figure 1 As shown, the specific steps are:
[0080] Step 1: Build a vulnerability database, download the 2010-2016 vulnerability data from the National Vulnerability Database (NVD), select the vulnerability data under Linux, filter the fields, and import it into the local database.
[0081] The fields of the local vulnerability database are shown in Table 1.
[0082] Table 1 Vulnerability database field table
[0083]
[0084]
[0085] Step two, determine the privilege set category.
[0086] Privilege set categories include: system administrator privilege set, common system adm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com