Skip to main content

An Automatic Vulnerabilities Classification Method Based on Their Relevance

  • Conference paper
  • First Online:
Book cover Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

In this paper, we focus on the need for mining the relevance of computer security vulnerabilities and propose an automatic vulnerability classification method using the relevance. Based on the theory of privilege elevation, we set five privilege levels and use the concept of Prerequisite Privilege (PRE) and Result Privilege (RES) of each vulnerability to illustrate the change of an attacker’s privilege due to the vulnerabilities exploited by the attacker. We design two classifiers – one is based on TFIDF and the other is based on Naive Bayes theory – to automatically find out the PRE and RES of each vulnerability after trained by more than 7000 training data. Finally, we fuse these two classifiers and the experiment results on Linux vulnerability data show that this method has high accuracy and efficiency. Using this method, we successfully exploit the category of each new vulnerability and analyze the relevance between different vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. US Department of Commerce, NIST: Glossary of Key Information Security Terms. National Institute of Standards & Technology (2011)

    Google Scholar 

  2. Li, J., Li, W.: Security vulnerability description language. Comput. Eng. Appl. 38(12), 10–11 (2002). (in Chinese)

    Google Scholar 

  3. Goldberg, D.E.: Genetic Algorithm in Search, Optimization and Machine Learning. Addison-Wesley, Boston (1989)

    MATH  Google Scholar 

  4. Zhu, Y.: Research on network security evaluation technology based on Vulnerability Database. Nanjing University of Posts and Telecommunications (2009). (in Chinese with English abstract)

    Google Scholar 

  5. Gao, Y.S.: Design and implementation of security vulnerability database. Microellectronics Comput. 24(3), 99–101 (2007). (in Chinese)

    Google Scholar 

  6. Kan, A., Chan, J., Bailey, J.: A query based approach for mining evolving graphs. In: Eighth Australasian Data Mining Conference, vol. 101, pp. 139–150 (2009)

    Google Scholar 

  7. Landwehr, C.E.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26(3), 211–254 (1993)

    Article  Google Scholar 

  8. Du, W., Mathur, A.P.: Categorization of software errors that lead to security breaches. In: National Information Systems Security Conference, pp. 392–407 (2000)

    Google Scholar 

  9. Aslam, T., Tariq, M.: A Taxonomy of Security Faults in the Unix Operating System (2000)

    Google Scholar 

  10. Aslam, T., Krsul, I., Spafford, E.H.: Use of A Taxonomy of Security Faults, pp. 551–560. Purdue University (2000)

    Google Scholar 

  11. Porras, P.: STAT – A State Transition Analysis Tool for Intrusion Detection (1992)

    Google Scholar 

  12. Ammann, P., Pamula, J., Street, J.: A Host-based approach to network attack chaining analysis, computer security applications conference. pp. 72–84. IEEE Computer Society (2005)

    Google Scholar 

  13. Zhang, Y.Z.: Research on computer security vulnerabilities and corresponding key technologies. Harbin Institute of Technology (2006). (in Chinese with English abstract)

    Google Scholar 

  14. Mantrach, A., Yen, L., Callut, J.: The sum-over-paths covariance kernel: a novel covariance measure between nodes of a directed graph. IEEE Trans. Pattern Anal. Mach. Intell. 32(6), 1112–1126 (2010)

    Article  Google Scholar 

  15. Asghari, E.M., Nematzadeh, H.: Predicting air pollution in Tehran: genetic algorithm and back propagation neural network. J. Al Data Min. (2016)

    Google Scholar 

Download references

Acknowledgments

This paper is partially supported by Basic Scientific Research Program of Chinese Program of Chinese Ministry of Industry and Information Technology (Grant No. JCKY2016602B001) and National Key R&D Program of China (Grant No. 2016YFB080000).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Lv .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, H., Lv, K., Hu, C. (2017). An Automatic Vulnerabilities Classification Method Based on Their Relevance. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics