ASVC: An automatic security vulnerability categorization framework based on novel features of vulnerability data

被引:6
|
作者
Wen, Tao [1 ,2 ]
Zhang, Yuqing [1 ,2 ]
Wu, Qianru [2 ]
Yang, Gang [2 ]
机构
[1] State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an,710071, China
[2] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing,101408, China
来源
Journal of Communications | 2015年 / 10卷 / 02期
关键词
Compendex;
D O I
10.12720/jcm.10.2.107-116
中图分类号
学科分类号
摘要
Data mining
引用
收藏
页码:107 / 116
相关论文
共 50 条
  • [1] A novel automatic severity vulnerability assessment framework
    Wen, Tao
    Zhang, Yuqing
    Dong, Ying
    Yang, Gang
    Journal of Communications, 2015, 10 (05): : 320 - 329
  • [2] Vulnerability-based Security Pattern Categorization in Search of Missing Patterns
    Anand, Priya
    Ryoo, Jungwoo
    Kazman, Rick
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 476 - 483
  • [3] VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection
    Chen, Jinfu
    Feng, Qiaowei
    Cai, Saihua
    Shi, Dengzhou
    Towey, Dave
    Chen, Yuhao
    Wang, Dongjie
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 287 - 305
  • [4] An Automatic Software Vulnerability Classification Framework
    Davari, Maryam
    Zulkernine, Mohammad
    Jaafar, Fehmi
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 44 - 49
  • [5] Community Based Platform for Vulnerability Categorization
    Komarkova, Jana
    Sadlek, Lukas
    Lastovicka, Martin
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [6] Pangr: A Behavior-based Automatic Vulnerability Detection and Exploitation Framework
    Liu, Danjun
    Wang, Jingyuan
    Rong, Zelin
    Mi, Xianya
    Gai, Fangyu
    Yong, Tang
    Wang, Baosheng
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 705 - 712
  • [7] SV-AF - A Security Vulnerability Analysis Framework
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 219 - 229
  • [8] ATAVE: A Framework for Automatic Timing Attack Vulnerability Evaluation
    Park, Jungmin
    Corba, Massimiliano
    de la Serna, Antonio E.
    Vigeant, Richard L.
    Tehranipoor, Mark
    Bhunia, Swarup
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 559 - 562
  • [9] Security Data Mining in an Ontology for Vulnerability Management
    Wang, Ju An
    Guo, Minzhe
    2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS, 2009, : 597 - 603
  • [10] NoSQL Injection: Data Security on Web Vulnerability
    Abdalla, Hemn B.
    Li, Guoquang
    Lin, Jinzhao
    Alazeez, Mustafa A.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 55 - 64