首页 | 本学科首页   官方微博 | 高级检索  
     

基于SECUNIA漏洞库的数据挖掘算法研究
引用本文:周密,宋晨阳,蒋丹婷.基于SECUNIA漏洞库的数据挖掘算法研究[J].通信技术,2015,48(1):86-89.
作者姓名:周密  宋晨阳  蒋丹婷
作者单位:上海通用识别技术研究所,上海 201112
摘    要:信息安全关系到一个国家政治、经济和文化各个层面的发展。漏洞往往是引起信息安全事件的重要因素。利用数据挖掘技术,可以从大量的数据中提取出潜在的有用信息和知识。先简要介绍信息安全漏洞库和数据挖掘的相关概念,并针对Secunia漏洞库研究建立关联分析的数据挖掘过程,分析出漏洞和软件间的关联规则,为信息安全漏洞分析提供了参考。

关 键 词:数据挖掘  Secunia漏洞库  关联分析  

Data Mining Algorithm based on SECUNIA Database
ZHOU Mi,SONG Chen-yang,JIANG Dan-ting.Data Mining Algorithm based on SECUNIA Database[J].Communications Technology,2015,48(1):86-89.
Authors:ZHOU Mi  SONG Chen-yang  JIANG Dan-ting
Affiliation:Shanghai General Recognition Technology Institute, Shanghai 201112, China
Abstract:Information security plays an important role in the political, economic and cultural development of a state. Vulnerability tends to be an essential factor of information security. It extracts implicit potentially useful information and knowledge from the large amounts of data via data mining. Firstly, this paper briefly introduces the realtive concept of vulnerability databases and data mining, and aming at the research of Secunia vulnerability databases, the data mining process of correaltion analysis is established. What’s more, association rules between vulnerabilities and softwares are analyzed, and some reference is also provided for vulnerability databases of information security.
Keywords:data  mining  Secunia  vulnerity  database  association  analysis  
点击此处可从《通信技术》浏览原始摘要信息
点击此处可从《通信技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号