期刊文献+

采用关键词抽取技术的Web安全漏洞分析

Analysis of Web Security Vulnerability With Automatic Keyphrase Extraction
下载PDF
导出
摘要 针对大量Web安全漏洞数据难以分析的问题,采用关键词抽取技术TextRank提取漏洞关键词。首先,利用网络爬虫和正则表达式获取了Exploit-db网站上1999年至2015年间的安全漏洞数据,分析结果表明近6年内该网站上Web安全漏洞数量和质量在不断下降;然后,采用TextRank方法提取了每年的漏洞关键词,结果表明每年主要漏洞类型变化情况较小,注入漏洞是主要的安全漏洞,Word Press是存在漏洞最多的应用程序,PHP应用程序是出现漏洞最多的平台;最后,研究了导致Web安全漏洞数量不断减少的原因。 The TextRank which is the automatic key phrase extraction technology is applied for extracting the vulnerability keywords. Firstly, the security vulnerability data in Exploit-db be- tween 1999 and 2015 year is obtained by web crawler and regular expression. The results present that the quantity and quality of the web security vulnerability keeps falling down. Secondly, the vulnerability keywords every year are extracted by TextRank. The results present that the main vulnerabilities in six years change little, the injection vulnerability is the main vulnerability, WordPress has the most vulnerabilities, the most vulnerabilities appears in the application using PHP. Finally,the causes what result in the number of decreasing vulnerabilities are studied.
机构地区 解放军 解放军
出处 《电子信息对抗技术》 2016年第5期52-56,共5页 Electronic Information Warfare Technology
关键词 网络空间安全 Web安全漏洞 关键词提取 cyberspace security web security vulnerability key phrase extraction TextRank
  • 相关文献

参考文献11

  • 1四叶草安全公司.BugScan漏洞发布平台[EB/OL].[2016-1-26].http://q.bugscan.net.
  • 2唐朝安全巡航.TangScan漏洞发布平台[EB/OL].[2016-1-26].http://www.tangscan.com.
  • 3知道创宇安全团队.Seebug漏洞发布平台[EB/OL].[2016-1-26].https://www.seebug.org.
  • 4诸葛建伟,陈立波,孙松柏,等.Metasploit渗透测试魔鬼训练营[M].北京:机械工业出版社,2013 : 1-27.
  • 5Exploit Database I~ ~. Offensive Security Exploit Da- tabase Archive [ EB/OL ]. [ 2016-1 - 26 ]. https :// www. exploit-db, org.
  • 6MIHALCEA R, TARAU P. TextRank: Bringing Order into Texts[ C]// Proceedings of EMNLP-04 and the 2004 Conference on Empirical Methods in Natural Lan- guage Processing. Stroudsburg:Association for Compu- tational Linguistics ,2004 :404-411.
  • 7BURTON D W. Intro to Automatic Keyphrase Extrac- tion [ EB/OL ]. [ 2016 - 1 - 26 ]. https ://bdewilde. github, io/.
  • 8JACOB P. Python 3 Text Processing with NLTK 3 Cook- book[ M]. Birmingham:Packt Publishing Ltd,2014.
  • 9DEERCHAO.正则表达式30分钟入门教程[EB/OL]. [ 2016-1-26 ]. https://deerchao, net/tutorial /regex/regex. html.
  • 10OWASP. OWASP Top 10-2013 The Ten Most Criti- cal Web Application Security Risks[ EB/OL]. [2016 - 1 - 30 ]. https://www, owasp, org/images/5/51/ OWASP_Top 10 2013-Chine se- V1.2. pdf.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部