2015
DOI: 10.12720/jcm.10.2.107-116
|View full text |Cite
|
Sign up to set email alerts
|

ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data

Abstract: Security vulnerabilities are a main cause of network security. Vulnerability classification gives us a better understanding of the essence of vulnerabilities, which help propose efficient solutions. However, applying Vulnerability Categorization Standard (VCS) to manually categorize vulnerabilities is impracticable since it is time-consuming and subjective. To address this issue, a new framework named Automatic Security Vulnerabilities Categorization Framework (ASVC) is proposed based on Text Mining. To furthe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Therefore, data is used from the CWE database only for the 102 weaknesses that are present also in NVD indirectly via CVE mappings. Although the present context is weaknesses, the idea here is similar to the enforcement of "one-to-one vulnerabilities" between vulnerability databases [35]. In contrast to some previous studies [10], all textual information is used for constructing the corpora.…”
Section: Data Sourcesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, data is used from the CWE database only for the 102 weaknesses that are present also in NVD indirectly via CVE mappings. Although the present context is weaknesses, the idea here is similar to the enforcement of "one-to-one vulnerabilities" between vulnerability databases [35]. In contrast to some previous studies [10], all textual information is used for constructing the corpora.…”
Section: Data Sourcesmentioning
confidence: 99%
“…To contribute toward sealing some of these gaps, this paper tentatively examines the validity of common textual information retrieval techniques for extracting CWEs from vulnerability databases. The extraction itself has practical value because many vulnerability databases do not catalog weaknesses, partially due to the complexity of the CWE framework and the manual work required [35]. By superseding the manual assignment of security bug reports to CWEs [8], automatic extraction can also facilitate empirical security research.…”
Section: Introductionmentioning
confidence: 99%
“…Chi-squared and info gain feature selection were used to rank features for use in classifying configuration bug reports [36]. Feature selection was also used for dimensionality reduction to categorize bug reports based on CWE standards [34]. Unlike related works, this work focuses on improving the vocabulary of the feature vectors to classify software bug reports to security related and non-security related.…”
Section: Research Questions and Contributionsmentioning
confidence: 99%
“…A successful automated identification of security bug reports has been done on NASA projects through machine learning approaches [11]. Automated classification of security bug reports has also been attempted on other datasets [30], [9], [34].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation