Research on the Data Mining Method based on Information Security Vulnerability Ontology
- DOI
- 10.2991/icmmita-15.2015.50How to use a DOI?
- Keywords
- Information security; Data mining; Vulnerability ontology; Related information.
- Abstract
Information security has experienced a long time from the concept to deepen. Nowadays, with the development and in-depth of computer science and technology, the problem of information security grow with each passing day out. In June 2014, the freely available WiFi has trap vulnerability event, it specifically steals important information in the user's mobile phone. Information security and people's lives are closely linked, causing everyone to worry about the safety of confidence. Internationally, the United States, Germany, Britain, Japan and Russia and some other developed countries are relatively early for the study of information security, the larger of their human and financial investment has obtained a more fruitful results, at the same time the use of security information system is also more common. In recent years, China has begun to research and information security related to the basic theory and core technology issues, but because the specialized information security senior personnel is relatively small, the development of domestic information security is slow. This paper studies and explore the data mining method based on the information security vulnerabilities, the method can dig out the hidden association information behind the data through the establishment of security information system, but also judge the authenticity of the vulnerability ontology according to the relevant data information, and the feasibility and the application of the research direction are determined by experiments.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Han Zhang AU - Yali Lv PY - 2015/11 DA - 2015/11 TI - Research on the Data Mining Method based on Information Security Vulnerability Ontology BT - Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications PB - Atlantis Press SP - 251 EP - 256 SN - 2352-538X UR - https://doi.org/10.2991/icmmita-15.2015.50 DO - 10.2991/icmmita-15.2015.50 ID - Zhang2015/11 ER -