Font Size: a A A

Research On Vulnerability Related Technologies

Posted on:2007-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:F H WangFull Text:PDF
GTID:2178360185967843Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the increase of security problems in internet, people gradually realize the importance of security. Most security problems are caused by system vulnerabilities or software vulnerabilities. In order to reduce security problems and improve the security quality of system or software, it's significant to study vulnerabilities.To start with, when concerned with vulnerability related technologies, the technology details are usually emphasized, such as the principles of vulnerabilities or the exploit methods of vulnerabilities. That's why evil codes such as viruses, worms and trojans are defended against. But it's far from achieving the final goals, the way of reducing vulnerabilities and the idea of security programming.This paper discusses the conception and the classification of vulnerabilities, and proposes our comprehension. It introduces induction which will concern on technology details, summarize rules and bring forward assumptions. Based on that, it is necessary to establish a vulnerability database which is scientific and comprehensive, collect vulnerability information and facilitate later research. The vulnerability database is designed for professional users, emphasizes on the technology details of vulnerabilities, opens to the internet and is compatible with CVE. The database management system is designed to provide the uniform interface for database access.Rules are usually behind vast information. So digging for valuable information is based on vulnerability database. This paper focuses on the statistical rules, try to find the related rules between data, and propose a theory called "similar prediction" which is verified by fact. This theory...
Keywords/Search Tags:vulnerability, vulnerability mining, data mining, similar prediction, verification of hypothesis
PDF Full Text Request
Related items