Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution

View through CrossRef
An operating system is the essence of software, serving as the foundation for the operation of various application software. The security of the operating system is crucial for the national informatization construction. Data indicates that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system. Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVE) related to Linux system reported each year. Therefore, research and prevention of vulnerabilities in the Linux system are particularly important. To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux. The study explores the evolutionary patterns of vulnerability characteristics. Specific research contents include: (1) Data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) Cross-statistical analysis of structured data features in vulnerability reports; (3) Unstructured data feature mining in vulnerability reports based on domain knowledge; (4) Analysis of the evolution of vulnerability characteristics. This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.
Title: Domain Knowledge-Based Analysis of Linux Vulnerability Characteristics and Evolution
Description:
An operating system is the essence of software, serving as the foundation for the operation of various application software.
The security of the operating system is crucial for the national informatization construction.
Data indicates that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system.
Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVE) related to Linux system reported each year.
Therefore, research and prevention of vulnerabilities in the Linux system are particularly important.
To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux.
The study explores the evolutionary patterns of vulnerability characteristics.
Specific research contents include: (1) Data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) Cross-statistical analysis of structured data features in vulnerability reports; (3) Unstructured data feature mining in vulnerability reports based on domain knowledge; (4) Analysis of the evolution of vulnerability characteristics.
This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.

Related Results

The Quiet Rebellion
The Quiet Rebellion
This article discusses Linux which is an emerging technology that will affect many mechanical engineers. Linux is a freely distributed, open-source Unix-like operating system, orig...
Linux
Linux
Abstract Linux (pronounced LIN‐ucks) is the common name for any well‐defined collection of system and application software (a distrib...
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Rancang Bangun Sistem Jaringan Menggunakan Linux Sabily pada Laboraturium Akademi Ilmu Komputer (AIKOM) Ternate
Rancang Bangun Sistem Jaringan Menggunakan Linux Sabily pada Laboraturium Akademi Ilmu Komputer (AIKOM) Ternate
Abstrak: Tujuan Penelitian ini adalah Untuk merancang dan mengimplementasikan jaringan protokol IPv4 pada Kampus Aikom Ternate, Penelitian ini dilakukan pada Laboraturium Akademi I...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
Comparative analysis of the yacht marinas' vulnerability to sea level rise by using an integrated vulnerability index
Comparative analysis of the yacht marinas' vulnerability to sea level rise by using an integrated vulnerability index
This study aims to analyse the vulnerability of yacht marinas in Bodrum to sea level rise (SLR) compound impacts using seven spatial physical and eight socio-economic parameters. A...
Geological hazard vulnerability assessment based on Cloud model in Zhejiang Province, China
Geological hazard vulnerability assessment based on Cloud model in Zhejiang Province, China
Abstract Geological hazard vulnerability assessment plays a crucial role in disaster prevention and mitigation strategies. However, current methodologies often prioritize i...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
Abstract Objective This review paper examines the concept of vulnerability in the overall literature and its relation to inform...

Back to Top