期刊文献+

基于LDA主题模型的安全漏洞分类 被引量:11

National security vulnerability database classification based on an LDA topic model
原文传递
导出
摘要 采用隐含Dirichlet分布主题模型(latent Dirichletallocation,LDA)和支持向量机(support vector machine,SVM)相结合的方法,在主题向量空间构建一个自动漏洞分类器。以中国国家信息安全漏洞库(CNNVD)中漏洞记录为实验数据。实验表明:基于主题向量构建的分类器的分类准确度比直接使用词汇向量构建的分类器有8%的提高。 The current vulnerabilities in China are analyzed using a dataset from the China National Vulnerability Database of Information Security(CNNVD),with a combined latent Dirichlet allocation(LDA) topic model and a support vector machine(SVM) to construct a classifier in the topic vector space.Tests show that the classifier based on topic vectors has about 8% better classification performance than that based on text vectors.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第10期1351-1355,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家重点科技专题“核高基”资助项目(2010ZX01036-001-002)
关键词 漏洞分类 隐含Dirichlet分布(LDA) 支持向量机(SVM) 中国国家信息安全漏洞库(CNNVD) vulnerability classification latent Dirichlet allocation(LDA) support vector machine(SVM) China National Vulnerability Database of Information Security(CNNVD)
  • 相关文献

参考文献16

  • 1Abbott R,Chin J,Donnelley J,et al.Security Analysis andEnhancements of Computer Operating Systems[R].Washington DC,USA:US Department of Commerce,1976.
  • 2Bisbey II R,Hollingworth D.Protection Analysis:FinalReport[R].Marina Del Rey,USA:University of SouthernCalifornia,1978.
  • 3Bishop M,Bailey D.A Critical Analysis of VulnerabilityTaxonomies[R].Davis,USA:University of California atDavis,1996.
  • 4Christey S.The Preliminary List of Vulnerability Examplesfor Researchers[R].Bedford,USA:Mitre,2006.
  • 5杨斯杰,武文斌.数据库漏洞分类研究[J].电脑知识与技术,2010,6(9):6905-6906. 被引量:1
  • 6Landwehr C,Bull A,Mcdemott J,et al.A taxonomy ofcomputer program security flaws[J].ACM ComputingSurveys,1994,26(3):211-254.
  • 7Aslam T,Krsul I,Spafford E.Use of a Taxonomy ofSecurity Faults[R].West Lafayette,USA:PurdureUniversity.1996.
  • 8CHEN Zhongqiang,ZHANG Yuan,CHEN Zhongrong.Acategorization framework for common computer vulnerabilitiesand exposures[J].The Computer Journal,2010,53(5):551-580.
  • 9LI Zhenmin,TAN Lin,WANG Xuanhui,et al.Have thingschanged now?An empirical study of bug characteristics inmodern open source software[C] //Proceedings of the 1stWorkshop on Architectural and System Support forImproving Software Dependability.San Jose,USA:ACM,2006:25-33.
  • 10Li Y L.An Approach towards Standardising VulnerabilityCategories[D].Pretoria,South Africa:University ofPretoria,2007.

二级参考文献26

  • 1Abbott R P,Chin J S,Donnelley J E,et al.Security Analysis and Enhancements of Computer Operating Systems[J].NBSIR 76-1041,Institute for Computer Sciences and Technology,National Bureau of Standards (Apr.1976).
  • 2Bisbey R,Hollingsworth D.Protection Analysis Project Final Report[R].Information Sciences Institute,University of Southern California,Marina Del Rey,CA,1978.
  • 3Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies[R].Technical Report CSE-96-11,1996.
  • 4Christey S.The Preliminary List of Vulnerability Examples for Researchers[EB/OL].http://cve.mitre.org/docs/plover/.(March 2006).
  • 5Weber S,Paul A,Paradkar A.A,Software Flaw Taxonomy:Aiming Tools At Security"Software Engineering for Secure Systems-Building Trust worthy Applications(SESS'05).
  • 6戴瑞恩.一种新型的基于规则实现的数据库安全检测方法[D].北京:清华大学,2003.
  • 7蔡义望.数据库安全检测系统设计与实现[D].北京:清华大学,2002.
  • 8National vulnerability database[EB/OL], http://nvd.nisLgov/.
  • 9Sccurityfoucs[EB/OL]. http://www.sccurityfocus.com/bid/.
  • 10IBM ISS X-force[EB/OL]. http://xforce.iss.netL.

共引文献23

同被引文献116

引证文献11

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部