Abstract
Abstract
The information technology level of China continues to improve, and various industries are digitalized in different degrees. However, the development of the network has correspondingly brought the trouble of loopholes, which have caused mass economic losses to many enterprises. In the era of big data, it is necessary to understand the characteristics of the ever-emerging vulnerabilities. In this study, we used descriptive statistics and programming techniques to analyze more than 140,000 vulnerability records from CVE and CNNVD. We visualize the development trend of vulnerabilities through descriptive statistics and summarized the characteristics of vulnerabilities in products from manufacturers of different scales. The result shows that large companies usually face more and severer loopholes. Then, multivariate regression is conducted to explore the relationship between vulnerability type, threat type and hazard level. K-means clustering method is employed to select and extract features based on the description paragraphs of vulnerabilities. Finally, we categorize the loopholes according to different patterns, so as to find a breakthrough point for a quicker solution to new vulnerabilities with the existing classified database. The combined sources are proved to be useful for clustering analysis.
Subject
General Physics and Astronomy
Reference4 articles.
1. Application Research of Computer Information Technology in Network Security in the Era of Big Data;Dong;J. Information and Computers (Theoretical edition),2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comprehensive Analysis of NVD Concurrency Vulnerabilities;2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS);2022-12
2. Towards System Security: What a Comparison of National Vulnerability Databases Reveals;2022 17th Iberian Conference on Information Systems and Technologies (CISTI);2022-06-22