Title Research on the Data Mining Method based on Information Security Vulnerability Ontology
Authors Zhang Han
Lv Yali
Affiliation Peking Univ, Beijing 100871, Peoples R China.
Henan Univ Tradit Chinese Med, Zhengzhou 450008, Peoples R China.
Keywords Information security
Data mining
Vulnerability ontology
Related information
Issue Date 2015
Publisher PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS
Citation PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS.Qingdao, PEOPLES R CHINA,2015/1/1,35(251-256).
Abstract Information security has experienced a long time from the concept to deepen. Nowadays, with the development and in-depth of computer science and technology, the problem of information security grow with each passing day out. In June 2014, the freely available WiFi has trap vulnerability event, it specifically steals important information in the user's mobile phone. Information security and people's lives are closely linked, causing everyone to worry about the safety of confidence. Internationally, the United States, Germany, Britain, Japan and Russia and some other developed countries are relatively early for the study of information security, the larger of their human and financial investment has obtained a more fruitful results, at the same time the use of security information system is also more common. In recent years, China has begun to research and information security related to the basic theory and core technology issues, but because the specialized information security senior personnel is relatively small, the development of domestic information security is slow. This paper studies and explore the data mining method based on the information security vulnerabilities, the method can dig out the hidden association information behind the data through the establishment of security information system, but also judge the authenticity of the vulnerability ontology according to the relevant data information, and the feasibility and the application of the research direction are determined by experiments.
URI http://hdl.handle.net/20.500.11897/446351
ISSN 2352-538X
Indexed CPCI-S(ISTP)
Appears in Collections: 待认领

Files in This Work
There are no files associated with this item.

Web of Science®


0

Checked on Last Week

百度学术™


0

Checked on Current Time




License: See PKU IR operational policies.