An automatic vulnerabilities classification method based on their relevance

Hao Zhang, Kun Lv*, Changzhen Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

In this paper, we focus on the need for mining the relevance of computer security vulnerabilities and propose an automatic vulnerability classification method using the relevance. Based on the theory of privilege elevation, we set five privilege levels and use the concept of Prerequisite Privilege (PRE) and Result Privilege (RES) of each vulnerability to illustrate the change of an attacker’s privilege due to the vulnerabilities exploited by the attacker. We design two classifiers - one is based on TFIDF and the other is based on Naive Bayes theory - to automatically find out the PRE and RES of each vulnerability after trained by more than 7000 training data. Finally, we fuse these two classifiers and the experiment results on Linux vulnerability data show that this method has high accuracy and efficiency. Using this method, we successfully exploit the category of each new vulnerability and analyze the relevance between different vulnerabilities.

Original languageEnglish
Title of host publicationNetwork and System Security - 11th International Conference, NSS 2017, Proceedings
EditorsZheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
PublisherSpringer Verlag
Pages475-485
Number of pages11
ISBN (Print)9783319647005
DOIs
Publication statusPublished - 2017
Event11th International Conference on Network and System Security, NSS 2017 - Helsinki, Finland
Duration: 21 Aug 201723 Aug 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10394 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Network and System Security, NSS 2017
Country/TerritoryFinland
CityHelsinki
Period21/08/1723/08/17

Keywords

  • Classifier fusion
  • Relevance
  • Security vulnerability

Fingerprint

Dive into the research topics of 'An automatic vulnerabilities classification method based on their relevance'. Together they form a unique fingerprint.

Cite this