Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction

In recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerabil...

Full description

Bibliographic Details
Main Author: REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2020-07-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/CN/abstract/abstract2266.shtml
id doaj-174ef8d3711c41b190558122b74135a7
record_format Article
spelling doaj-174ef8d3711c41b190558122b74135a72021-08-10T05:45:46ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182020-07-011471173118210.3778/j.issn.1673-9418.1908022Automatic Classification of Computer Vulnerability Based on[S-C]Feature ExtractionREN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin01. College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066001, China 2. Computer Virtual Technology and System Integration Laboratory of Hebei Province, Qinhuangdao, Hebei 066001, ChinaIn recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerability description information based on information entropy and comprehensive?function[(S-C)]feature extraction and combines the averaged one-dependence estimators (AODE) classifier. First, the feature words are extracted by the[S-C]feature extraction method. By combining the comprehensive function[C]of the importance degree between classes and within classes of words, the importance degree of words to classes is calculated. Then, the information entropy[S]of words to classes is used to weaken the importance of words with chaotic classification and an accurate feature set is selected. Finally, the vulnerability data set is classified by using AODE which relates the relationship between feature word sets. The experimental comparison shows that the[S-C]feature extraction method can extract the accurate feature word set, and the classification accuracy combined with AODE classifier is higher than traditional classifier model.http://fcst.ceaj.org/CN/abstract/abstract2266.shtmlcomputer vulnerabilitytext classificationfeature extractioninformation entropy
collection DOAJ
language zho
format Article
sources DOAJ
author REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin
spellingShingle REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
Jisuanji kexue yu tansuo
computer vulnerability
text classification
feature extraction
information entropy
author_facet REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin
author_sort REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin
title Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
title_short Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
title_full Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
title_fullStr Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
title_full_unstemmed Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
title_sort automatic classification of computer vulnerability based on[s-c]feature extraction
publisher Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
series Jisuanji kexue yu tansuo
issn 1673-9418
publishDate 2020-07-01
description In recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerability description information based on information entropy and comprehensive?function[(S-C)]feature extraction and combines the averaged one-dependence estimators (AODE) classifier. First, the feature words are extracted by the[S-C]feature extraction method. By combining the comprehensive function[C]of the importance degree between classes and within classes of words, the importance degree of words to classes is calculated. Then, the information entropy[S]of words to classes is used to weaken the importance of words with chaotic classification and an accurate feature set is selected. Finally, the vulnerability data set is classified by using AODE which relates the relationship between feature word sets. The experimental comparison shows that the[S-C]feature extraction method can extract the accurate feature word set, and the classification accuracy combined with AODE classifier is higher than traditional classifier model.
topic computer vulnerability
text classification
feature extraction
information entropy
url http://fcst.ceaj.org/CN/abstract/abstract2266.shtml
work_keys_str_mv AT renjiadongwangqianwangfeiliyazhouliujiaxin automaticclassificationofcomputervulnerabilitybasedonscfeatureextraction
_version_ 1721212749781925888