Processing of Unstructured Information About Software Vulnerabilities
To maintain the information security of a computer system, it is necessary to regularly audit the used system components and their corresponding vulnerabilities. However, accounting for software flaws is a time-consuming task due to the constant emergence of new unstructured information about discov...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2022-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://www.fruct.org/publications/fruct31/files/Nko.pdf |
Summary: | To maintain the information security of a computer system, it is necessary to regularly audit the used system components and their corresponding vulnerabilities. However, accounting for software flaws is a time-consuming task due to the constant emergence of new unstructured information about discovered vulnerabilities. To increase the speed of analyzing relevant information, the algorithm for processing vulnerability descriptions and the XML-based output data presentation format were proposed. Processing a text description means identifying a name and version of vulnerable software, as well as determining the type of a vulnerability and a level of severity. At the current stage of the research, the achieved classification accuracy is 87%. |
---|---|
ISSN: | 2305-7254 2343-0737 |