Analysis of vulnerability correlation based on data fitting

Long Wang, Rui Ma*, Hao Ran Gao, Xia Jing Wang, Chang Zhen Hu

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

1 引用 (Scopus)

摘要

Discovering the correlation between vulnerability is a significant method of vulnerability analysis. The traditional way focuses on single vulnerability rather than considers the relationship between several vulnerabilities. That may spend much time but achieve a poor effect. This paper presents a new method working on the vulnerability distribution data. This method applies logarithmic normal distribution to the distribution data of different categories of vulnerability to calculate their correlation coefficient. Then, the correlativity between different vulnerability classifications could be qualitatively determined. The experiment was performed on two types of vulnerability database, namely CNNVD and SecurityFocus. The correlativity of different vulnerability classification obtained by the proposed method is verified both quantitative and qualitative ways. The results highlight the effectiveness of the proposed method.

源语言英语
主期刊名Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings
编辑Fei Yan, Ming Xu, Shaojing Fu, Zheng Qin
出版商Springer Verlag
165-180
页数16
ISBN(印刷版)9789811070792
DOI
出版状态已出版 - 2017
活动11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017 - Changsha, 中国
期限: 14 9月 201717 9月 2017

出版系列

姓名Communications in Computer and Information Science
704
ISSN(印刷版)1865-0929

会议

会议11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017
国家/地区中国
Changsha
时期14/09/1717/09/17

指纹

探究 'Analysis of vulnerability correlation based on data fitting' 的科研主题。它们共同构成独一无二的指纹。

引用此