Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution

View through CrossRef
An operating system is the essence of software, serving as the foundation for the operation of various application software. The security of the operating system is crucial for the national informatization construction. Data indicates that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system. Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVE) related to Linux system reported each year. Therefore, research and prevention of vulnerabilities in the Linux system are particularly important. To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux. The study explores the evolutionary patterns of vulnerability characteristics. Specific research contents include: (1) Data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) Cross-statistical analysis of structured data features in vulnerability reports; (3) Unstructured data feature mining in vulnerability reports based on domain knowledge; (4) Analysis of the evolution of vulnerability characteristics. This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.
Title: Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution
Description:
An operating system is the essence of software, serving as the foundation for the operation of various application software.
The security of the operating system is crucial for the national informatization construction.
Data indicates that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system.
Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVE) related to Linux system reported each year.
Therefore, research and prevention of vulnerabilities in the Linux system are particularly important.
To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux.
The study explores the evolutionary patterns of vulnerability characteristics.
Specific research contents include: (1) Data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) Cross-statistical analysis of structured data features in vulnerability reports; (3) Unstructured data feature mining in vulnerability reports based on domain knowledge; (4) Analysis of the evolution of vulnerability characteristics.
This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.

Related Results

Linux
Linux
Abstract Linux (pronounced LIN‐ucks) is the common name for any well‐defined collection of system and application software (a distrib...
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
AbstractObjectiveThis review paper examines the concept of vulnerability in the overall literature and its relation to informal caregivers.Vulnerability is frequently associated wi...
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
Forest fires are one of the environmental problems that recur almost every year in Indonesia. This problem if not handled properly will certainly cause various negative impacts suc...
Linux Based Mobile Operating Systems
Linux Based Mobile Operating Systems
In today’s mobile computing, Linux plays a significant role. The Linux kernel has been adopted by a variety of mobile operating systems to handle tasks such as device management, m...
Home Real-Time Remote Monitoring System Based on Embedded Linux
Home Real-Time Remote Monitoring System Based on Embedded Linux
Abstract Remote video monitoring is an important way of residential security. Due to some deficiencies of traditional home monitoring system such as high cost, large...
Study on seismic vulnerability analysis of the interaction system between saturated soft soil and subway station structures
Study on seismic vulnerability analysis of the interaction system between saturated soft soil and subway station structures
Abstract The seismic vulnerability of interaction system of saturated soft soil and subway station structures is explored in this paper. The coupled nonlinear numerical mod...

Back to Top