Research on the collection and process methods for security vulnerability information via Internet

Jia HUAI,Shu HUANG,He TANG
DOI: https://doi.org/10.3969/j.issn.1674-7720.2010.05.020
2010-01-01
Abstract:This paper aims at the actuality and existing problems of security vulnerability used by many computer security departments, and proposes several strategies to automatically collect vulnerability information by methods of downloading the open source database, submitting a query to database and using a search engine then discusses information extracting technique from XML, HTML and text files and establish multi-source data fusing.
What problem does this paper attempt to address?