Analysis of vulnerability correlation based on data fitting

Long Wang, Rui Ma*, Hao Ran Gao, Xia Jing Wang, Chang Zhen Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Discovering the correlation between vulnerability is a significant method of vulnerability analysis. The traditional way focuses on single vulnerability rather than considers the relationship between several vulnerabilities. That may spend much time but achieve a poor effect. This paper presents a new method working on the vulnerability distribution data. This method applies logarithmic normal distribution to the distribution data of different categories of vulnerability to calculate their correlation coefficient. Then, the correlativity between different vulnerability classifications could be qualitatively determined. The experiment was performed on two types of vulnerability database, namely CNNVD and SecurityFocus. The correlativity of different vulnerability classification obtained by the proposed method is verified both quantitative and qualitative ways. The results highlight the effectiveness of the proposed method.

Original languageEnglish
Title of host publicationTrusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings
EditorsFei Yan, Ming Xu, Shaojing Fu, Zheng Qin
PublisherSpringer Verlag
Pages165-180
Number of pages16
ISBN (Print)9789811070792
DOIs
Publication statusPublished - 2017
Event11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017 - Changsha, China
Duration: 14 Sept 201717 Sept 2017

Publication series

NameCommunications in Computer and Information Science
Volume704
ISSN (Print)1865-0929

Conference

Conference11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017
Country/TerritoryChina
CityChangsha
Period14/09/1717/09/17

Keywords

  • CNNVD
  • Correlation coefficient
  • Correlativity
  • Logarithmic normal distribution
  • SecurityFocus
  • Vulnerability correlation

Fingerprint

Dive into the research topics of 'Analysis of vulnerability correlation based on data fitting'. Together they form a unique fingerprint.

Cite this