Automatically Building an Information-Security Vulnerability Database / Extnded Abstract
Loading...
Authors
Arnold, Adrian D.
Hyla, Bret M.
Rowe, Neil C.
Advisors
Second Readers
Subjects
Date of Issue
2006-05-03
Date
May 3, 2006
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
Our goal was to collect data from the myriad computer vulnerability notices that exist on the World Wide Web and to mine it for interesting
information and patterns. Surprisingly, no single database currently brings together all the various kinds of data from the vulnerability sites. Of
particular interest to us was author and discoverer information since this provides valuable information about who is active in information security
and occasionally might indicate the authors of exploits; current databases do not connect this to other relevant information. We found that the
searchable parameters of the existing vulnerability databases were limited and inconsistent. Consequently, it is very difficult to get complete
information about computer vulnerabilities by searching Web sites.
Type
Conference Paper
Description
Opinions expressed are those of the
authors and do not represent the U.S. Government.
7th IEEE Workshop on Information Assurance, West Point, NY, June 2006
7th IEEE Workshop on Information Assurance, West Point, NY, June 2006
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
supported in part by NSF under the Cyber Trust Program
Funding
Format
Citation
7th IEEE Workshop on Information Assurance, West Point, NY, June 2006
Distribution Statement
Approved for public release; distribution is unlimited.
