Extracting Information about Security Vulnerabilities from Web Text

dc.contributor.authorMulwad, Varish
dc.contributor.authorLi, Wenjia
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.contributor.authorViswanathan, Krishnamurthy
dc.date.accessioned2018-11-14T17:33:44Z
dc.date.available2018-11-14T17:33:44Z
dc.date.issued2011-08-22
dc.descriptionProceedings of the Web Intelligence for Information Security Workshopen_US
dc.description.abstractThe Web is an important source of information about computer security threats, vulnerabilities and cyber-attacks. We present initial work on developing a framework to detect and extract information about vulnerabilities and attacks from Web text. Our prototype system uses Wikitology, a general purpose knowledge base derived from Wikipedia, to extract concepts that describe specific vulnerabilities and attacks, map them to related concepts from DBpedia and generate machine understandable assertions. Such a framework will be useful in adding structure to already existing vulnerability descriptions as well as detecting new ones. We evaluate our approach against vulnerability descriptions from the National Vulnerability Database. Our results suggest that it can be useful in monitoring streams of text from social media or chat rooms to identify potential new attacks and vulnerabilities or to collect data on the spread and volume of existing ones.en_US
dc.description.sponsorshipThis work was partially supported by an grant from the Air Force Office of Scientific Research (MURI FA9550-08- 1-0265) and a gift from Northrop Grumman Corporation.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/6040854en_US
dc.format.extent4 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/M2CV4BW2Z
dc.identifier.citationVarish Mulwad, Wenjia Li, Anupam Joshi, Tim Finin, and Krishnamurthy Viswanathan, Extracting Information about Security Vulnerabilities from Web Text, Proceedings of the Web Intelligence for Information Security Workshop, 2011, DOI: 10.1109/WI-IAT.2011.26en_US
dc.identifier.uri10.1109/WI-IAT.2011.26
dc.identifier.urihttp://hdl.handle.net/11603/11978
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2011 IEEE
dc.subjectsecurityen_US
dc.subjectvulnerabilityen_US
dc.subjectinformation extractionen_US
dc.subjectentity linkingen_US
dc.subjectComputer securityen_US
dc.subjectElectronic publishingen_US
dc.subjectData miningen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleExtracting Information about Security Vulnerabilities from Web Texten_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
566.pd.pdf
Size:
234.21 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: