通信学报 ›› 2015, Vol. 36 ›› Issue (10): 235-244.doi: 10.11959/j.issn.1000-436x.2015218

• 学术论文 • 上一篇    下一篇

UVDA:自动化融合异构安全漏洞库框架的设计与实现

温涛1,张玉清1,2,刘奇旭2,3,杨刚2   

  1. 1 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
    2 中国科学院大学 国家计算机网络入侵防范中心,北京 101408
    3 中国科学院 信息工程研究所 信息安全国家重点实验室,北京 100093
  • 出版日期:2015-10-25 发布日期:2015-10-27
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;北京市自然科学基金资助项目;中国科学院信息工程研究所信息安全国家重点实验室开放课题基金资助项目

UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database

Tao WEN1,Yu-qing ZHANG1,2,Qi-xu LIU2,3,Gang YANG2   

  1. 1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    2 National Computer Network Intrusion Protection Center,University of Chinese Academy of Sciences,Beijing 101408,China
    3 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
  • Online:2015-10-25 Published:2015-10-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;Beijing Municipal Natural Science Foundation;Open Project Program of the State Key Laboratory of Information Security

摘要:

安全漏洞是网络安全的关键,漏洞库旨在收集、评估和发布安全漏洞信息。然而,漏洞库相互之间存在数据的冗余和异构,导致漏洞信息共享困难。针对上述问题,收集和分析了15个主流漏洞库共计84.2万条漏洞数据。基于文本挖掘技术提出了漏洞去除重复的规则(准确率为94.4%),以及漏洞数据库融合(UVDA,uniform vulnerability database alliance)框架。最后在多个漏洞库上,实现了UVDA框架,实现过程完全自动化。生成的UVDA数据库已经应用于国家安全漏洞库,并且可以按照产品型号和时间进行统一的检索,推进了漏洞信息发布机制标准化进程。

关键词: 信息安全, 数据融合, 漏洞数据库, 文本挖掘, UVDA

Abstract:

Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.

Key words: information security, data fusion, vulnerability database, text mining, UVDA

No Suggested Reading articles found!