Association Rule Mining and Evaluation Based on Information Security Vulnerabilities Main Body

Article Preview

Abstract:

Information security is a matter of concern in any sector and industry, and the vulnerability is the important factor which caused this issue. Therefore it is necessary to analyze and predict the occurrence of vulnerability. This paper used the datas of CNNVD vulnerability database and Apriori algorithm to analyze and predict the occurrence of software vulnerability. In the data preprocessing stage by changing the level of vulnerability rule we can dig out more concept association. In the evaluation stage of association rules by designing filters we can find the rules in line with the degree of user interest. Finally, this papper could demonstrate the effectiveness of of this method by experiments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1282-1285

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H.Y. Yang, L.X. Xie and D. Zhu. Gray level analysis assessment model of the vulnerability severity. University of Electronic Science and Technology, 2010, 05: 778 -782 +799.

Google Scholar

[2] M.C. Zhang, F.P. Zeng and Y. Huang. The fuzzing testing technology based on vulnerability database. MINI - MICRO SYSTEMS, 2011, 04: 651-655.

Google Scholar

[3] M.X. Wang. Data mining Review. Software Guide, 2013, 10: 135-137.

Google Scholar

[4] D.L. Wang, Q. Qin. Analysis of data mining principles and algorithms. Technology Innovation Herald, 2010, 02: 193.

Google Scholar

[5] J. Li. Domain ontology construction method and application. Chinese Academy of Agricultural Sciences, (2009).

Google Scholar