Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability automatic classification method supporting vulnerability correlation mining

An automatic classification and correlation technology, applied in the field of information security, can solve problems such as the inability to evaluate the hazard level of vulnerabilities, the lack of specific characteristics, and vague concepts

Active Publication Date: 2017-06-27
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current vulnerability classification mainly includes the Unix operating system classification method proposed by Aslam of Purdue University’s COAST Laboratory, which is divided into operational failure, environmental failure and coding failure. However, due to the lack of specific quantitative indicators, it is impossible to evaluate the harm level of vulnerabilities; The software vulnerability classification method proposed by Wang Lidong of Harbin Institute of Technology describes the impact of vulnerabilities on security such as confidentiality, integrity, and availability. The generalized classification method proposed by Knight et al. There are four types of vulnerabilities. Due to a certain degree of conceptual ambiguity, there is no mutual exclusion between classes
[0005] The above classification methods all analyze the vulnerability as a single defect. Zhang Yongzheng emphasized the correlation between the vulnerabilities, and proposed that the premise of judging the relevance of the vulnerability is that the vulnerability can be accurately determined according to the "premise privilege set" and "result privilege set". Classification, implements a novel multi-dimensional quantitative attribute vulnerability classification method that supports correlation mining, but does not clearly point out the specific characteristics of each category, and cannot be automatically classified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability automatic classification method supporting vulnerability correlation mining
  • Vulnerability automatic classification method supporting vulnerability correlation mining
  • Vulnerability automatic classification method supporting vulnerability correlation mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The technical solution of the present invention will be described in detail below in conjunction with the drawings and embodiments.

[0079] Using the vulnerability automatic classification method that supports vulnerability association mining proposed by the present invention to classify vulnerabilities and obtain the operation process of the association relationship between vulnerabilities is as follows: figure 1 As shown, the specific steps are:

[0080] Step 1: Build a vulnerability database, download the 2010-2016 vulnerability data from the National Vulnerability Database (NVD), select the vulnerability data under Linux, filter the fields, and import it into the local database.

[0081] The fields of the local vulnerability database are shown in Table 1.

[0082] Table 1 Vulnerability database field table

[0083]

[0084]

[0085] Step two, determine the privilege set category.

[0086] Privilege set categories include: system administrator privilege set, common system adm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vulnerability automatic classification method supporting vulnerability correlation mining, and belongs to the technical field of information security. The method comprises the specific steps of 1, establishing a vulnerability database, and collecting vulnerability records; 2, determining a category of a privilege set; 3, training a classifier; and 4, testing data. Compared with an existing method, the vulnerability automatic classification method supporting the vulnerability correlation mining has the following advantages that (1) a vulnerability classification result is suitable for the vulnerability correlation mining; (2) categories have mutual exclusiveness and the classification is remarkable; and (3) vulnerability automatic classification is realized, so that the classification efficiency is improved and the labor cost is reduced.

Description

Technical field [0001] The invention relates to a method for automatically classifying vulnerabilities supporting vulnerabilities association mining, and belongs to the technical field of information security. Background technique [0002] Network security vulnerability refers to the existence of certain security vulnerabilities in the computer system that may be exploited by malicious subjects (attackers or attack programs), which may cause unauthorized access to system resources or cause other damage to the system. In recent years, mature vulnerability scanning technology and CVE (Common Vulnerabilities&Exposures) standards and Common Vulnerability Scoring System (CVSS) vulnerability rating methods have gradually developed, which can detect and discover vulnerabilities in the network, But it is impossible to analyze the correlation and mutual utilization of the vulnerabilities. The means of attack in network risk is often through related vulnerabilities, cut from one vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/577G06F2221/034G06F18/214
Inventor 胡昌振张皓吕坤
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products