Javascript must be enabled to continue!
Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution
View through CrossRef
An operating system is the essence of software, serving as the
foundation for the operation of various application software. The
security of the operating system is crucial for the national
informatization construction. Data indicates that many cybersecurity
incidents result from exploiting security vulnerabilities in the
operating system. Linux is currently the most widely used open-source
operating system, with thousands of Common Vulnerabilities and Exposures
(CVE) related to Linux system reported each year. Therefore, research
and prevention of vulnerabilities in the Linux system are particularly
important. To gain a better understanding of the characteristics of
Linux system vulnerabilities, this paper leverages knowledge in the
field of software security to analyze nearly 10,000 historical
vulnerability data in two core systems of Linux: Linux Kernel and Debian
Linux. The study explores the evolutionary patterns of vulnerability
characteristics. Specific research contents include: (1) Data collection
and cleaning of vulnerability data in Linux Kernel and Debian Linux
systems; (2) Cross-statistical analysis of structured data features in
vulnerability reports; (3) Unstructured data feature mining in
vulnerability reports based on domain knowledge; (4) Analysis of the
evolution of vulnerability characteristics. This paper provides
empirical lessons and guidance for Linux system vulnerabilities to
assist practitioners and researchers in better preventing and detecting
vulnerabilities in Linux and Linux-based systems.
Title: Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution
Description:
An operating system is the essence of software, serving as the
foundation for the operation of various application software.
The
security of the operating system is crucial for the national
informatization construction.
Data indicates that many cybersecurity
incidents result from exploiting security vulnerabilities in the
operating system.
Linux is currently the most widely used open-source
operating system, with thousands of Common Vulnerabilities and Exposures
(CVE) related to Linux system reported each year.
Therefore, research
and prevention of vulnerabilities in the Linux system are particularly
important.
To gain a better understanding of the characteristics of
Linux system vulnerabilities, this paper leverages knowledge in the
field of software security to analyze nearly 10,000 historical
vulnerability data in two core systems of Linux: Linux Kernel and Debian
Linux.
The study explores the evolutionary patterns of vulnerability
characteristics.
Specific research contents include: (1) Data collection
and cleaning of vulnerability data in Linux Kernel and Debian Linux
systems; (2) Cross-statistical analysis of structured data features in
vulnerability reports; (3) Unstructured data feature mining in
vulnerability reports based on domain knowledge; (4) Analysis of the
evolution of vulnerability characteristics.
This paper provides
empirical lessons and guidance for Linux system vulnerabilities to
assist practitioners and researchers in better preventing and detecting
vulnerabilities in Linux and Linux-based systems.
Related Results
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
AbstractObjectiveThis review paper examines the concept of vulnerability in the overall literature and its relation to informal caregivers.Vulnerability is frequently associated wi...
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
Forest fires are one of the environmental problems that recur almost every year in Indonesia. This problem if not handled properly will certainly cause various negative impacts suc...
Linux Based Mobile Operating Systems
Linux Based Mobile Operating Systems
In today’s mobile computing, Linux plays a significant role. The Linux kernel has been adopted by a variety of mobile operating systems to handle tasks such as device management, m...
Home Real-Time Remote Monitoring System Based on Embedded Linux
Home Real-Time Remote Monitoring System Based on Embedded Linux
Abstract
Remote video monitoring is an important way of residential security. Due to some deficiencies of traditional home monitoring system such as high cost, large...
Study on seismic vulnerability analysis of the interaction system between saturated soft soil and subway station structures
Study on seismic vulnerability analysis of the interaction system between saturated soft soil and subway station structures
Abstract
The seismic vulnerability of interaction system of saturated soft soil and subway station structures is explored in this paper. The coupled nonlinear numerical mod...


