Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications

Research on the Data Mining Method based on Information Security Vulnerability Ontology

Authors
Han Zhang, Yali Lv
Corresponding Author
Han Zhang
Available Online November 2015.
DOI
10.2991/icmmita-15.2015.50How to use a DOI?
Keywords
Information security; Data mining; Vulnerability ontology; Related information.
Abstract

Information security has experienced a long time from the concept to deepen. Nowadays, with the development and in-depth of computer science and technology, the problem of information security grow with each passing day out. In June 2014, the freely available WiFi has trap vulnerability event, it specifically steals important information in the user's mobile phone. Information security and people's lives are closely linked, causing everyone to worry about the safety of confidence. Internationally, the United States, Germany, Britain, Japan and Russia and some other developed countries are relatively early for the study of information security, the larger of their human and financial investment has obtained a more fruitful results, at the same time the use of security information system is also more common. In recent years, China has begun to research and information security related to the basic theory and core technology issues, but because the specialized information security senior personnel is relatively small, the development of domestic information security is slow. This paper studies and explore the data mining method based on the information security vulnerabilities, the method can dig out the hidden association information behind the data through the establishment of security information system, but also judge the authenticity of the vulnerability ontology according to the relevant data information, and the feasibility and the application of the research direction are determined by experiments.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications
Series
Advances in Computer Science Research
Publication Date
November 2015
ISBN
978-94-6252-120-9
ISSN
2352-538X
DOI
10.2991/icmmita-15.2015.50How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Han Zhang
AU  - Yali Lv
PY  - 2015/11
DA  - 2015/11
TI  - Research on the Data Mining Method based on Information Security Vulnerability Ontology
BT  - Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications
PB  - Atlantis Press
SP  - 251
EP  - 256
SN  - 2352-538X
UR  - https://doi.org/10.2991/icmmita-15.2015.50
DO  - 10.2991/icmmita-15.2015.50
ID  - Zhang2015/11
ER  -