Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.9.46

Modeling of a Software Vulnerability Identification Method  

Diako, Doffou jerome (Institut National Polytechnique Felix Houphouet-Boigny (INP-HB))
N'Guessan, Behou Gerard (Universite Virtuelle de Cote d'Ivoire)
ACHIEPO, Odilon Yapo M (Universite Virtuelle de Cote d'Ivoire)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.9, 2021 , pp. 354-357 More about this Journal
Abstract
Software vulnerabilities are becoming more and more increasing, their role is to harm the computer systems of companies, governmental organizations and agencies. The main objective of this paper is to propose a method that will cluster future software vulnerabilities that may spread. This method is developed by combining the Multiple Correspondence Analysis (MCA), the Elbow procedure and the Kmeans Algorithm. A simulation was done on a dataset of 15713 observations. This simulation allowed us to identify families of future vulnerabilities. This model was evaluated using the silhouette index.
Keywords
ACM; Unsupervised learning; Vulnerabilities; Cvss; Kmeans;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mike Schiffman et Cisco CIAG, ≪Guide complet du CVSS v1≫, 2005.
2 Wikistat, ≪Analyse factorielle multiple des correspondances (AFCM)≫. 2016.Disponible sur: https://www.math.univtoulouse.fr/~besse/Wikistat/pdf/st-m-explo-afcm.pdf
3 G.Schaffrath et al, ≪An Overview of IP Flow-Based Intrusion Detection Communications Surveys & Tutorials≫, IEEE, 2010.
4 K. Kumar et al, ≪≪Identifying Network Anomalies Using Clustering Technique in Weblog Data,≫, International Journal of Computers & Technology, , vol. 2 , n° %13, juin 2012.
5 Peter Mell, Karen Scarfone, et Carnegie Mellon, ≪A Complete Guide to the Common Vulnerability Scoring System Version 2.0≫, 2007. https://www.first.org/cvss/v2/guide
6 Zhengjie Li et al, ≪Anomaly Intrusion Detection Method Based on K-means Clustering Algorithm with Particle Swarm Optimization,≫, International Conference of Information Technology, Computer Engineering and Management Sciences, 2011.
7 C. Gupta, A. Sinhal, et R. Kamble, ≪Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey≫, IJCA, vol. 79, n° 6, p. 30-35, oct. 2013, doi: 10.5120/13747-1555.   DOI