p.1266
p.1270
p.1274
p.1278
p.1282
p.1286
p.1292
p.1297
p.1300
Association Rule Mining and Evaluation Based on Information Security Vulnerabilities Main Body
Abstract:
Information security is a matter of concern in any sector and industry, and the vulnerability is the important factor which caused this issue. Therefore it is necessary to analyze and predict the occurrence of vulnerability. This paper used the datas of CNNVD vulnerability database and Apriori algorithm to analyze and predict the occurrence of software vulnerability. In the data preprocessing stage by changing the level of vulnerability rule we can dig out more concept association. In the evaluation stage of association rules by designing filters we can find the rules in line with the degree of user interest. Finally, this papper could demonstrate the effectiveness of of this method by experiments.
Info:
Periodical:
Pages:
1282-1285
Citation:
Online since:
November 2014
Authors:
Price:
Сopyright:
© 2014 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: