Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction
In recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerabil...
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
2020-07-01
|
Series: | Jisuanji kexue yu tansuo |
Subjects: | |
Online Access: | http://fcst.ceaj.org/CN/abstract/abstract2266.shtml |
id |
doaj-174ef8d3711c41b190558122b74135a7 |
---|---|
record_format |
Article |
spelling |
doaj-174ef8d3711c41b190558122b74135a72021-08-10T05:45:46ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182020-07-011471173118210.3778/j.issn.1673-9418.1908022Automatic Classification of Computer Vulnerability Based on[S-C]Feature ExtractionREN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin01. College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066001, China 2. Computer Virtual Technology and System Integration Laboratory of Hebei Province, Qinhuangdao, Hebei 066001, ChinaIn recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerability description information based on information entropy and comprehensive?function[(S-C)]feature extraction and combines the averaged one-dependence estimators (AODE) classifier. First, the feature words are extracted by the[S-C]feature extraction method. By combining the comprehensive function[C]of the importance degree between classes and within classes of words, the importance degree of words to classes is calculated. Then, the information entropy[S]of words to classes is used to weaken the importance of words with chaotic classification and an accurate feature set is selected. Finally, the vulnerability data set is classified by using AODE which relates the relationship between feature word sets. The experimental comparison shows that the[S-C]feature extraction method can extract the accurate feature word set, and the classification accuracy combined with AODE classifier is higher than traditional classifier model.http://fcst.ceaj.org/CN/abstract/abstract2266.shtmlcomputer vulnerabilitytext classificationfeature extractioninformation entropy |
collection |
DOAJ |
language |
zho |
format |
Article |
sources |
DOAJ |
author |
REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin |
spellingShingle |
REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction Jisuanji kexue yu tansuo computer vulnerability text classification feature extraction information entropy |
author_facet |
REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin |
author_sort |
REN Jiadong, WANG Qian, WANG Fei, LI Yazhou, LIU Jiaxin |
title |
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction |
title_short |
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction |
title_full |
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction |
title_fullStr |
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction |
title_full_unstemmed |
Automatic Classification of Computer Vulnerability Based on[S-C]Feature Extraction |
title_sort |
automatic classification of computer vulnerability based on[s-c]feature extraction |
publisher |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press |
series |
Jisuanji kexue yu tansuo |
issn |
1673-9418 |
publishDate |
2020-07-01 |
description |
In recent years, the number of unknown computer vulnerabilities has increased rapidly. It is an important and unsolved problem for analyzing and classifying a large number of vulnerability data timely and accurately. Therefore, this paper proposes a text classification method for computer vulnerability description information based on information entropy and comprehensive?function[(S-C)]feature extraction and combines the averaged one-dependence estimators (AODE) classifier. First, the feature words are extracted by the[S-C]feature extraction method. By combining the comprehensive function[C]of the importance degree between classes and within classes of words, the importance degree of words to classes is calculated. Then, the information entropy[S]of words to classes is used to weaken the importance of words with chaotic classification and an accurate feature set is selected. Finally, the vulnerability data set is classified by using AODE which relates the relationship between feature word sets. The experimental comparison shows that the[S-C]feature extraction method can extract the accurate feature word set, and the classification accuracy combined with AODE classifier is higher than traditional classifier model. |
topic |
computer vulnerability text classification feature extraction information entropy |
url |
http://fcst.ceaj.org/CN/abstract/abstract2266.shtml |
work_keys_str_mv |
AT renjiadongwangqianwangfeiliyazhouliujiaxin automaticclassificationofcomputervulnerabilitybasedonscfeatureextraction |
_version_ |
1721212749781925888 |