An Overview of Research on Vulnerability Database Construction and Application
In the information society based on computers and networks,vulnerabilities in computer and network systems have brought great challenges to network information security.Most network attacks are launched based on vulnerabilities,and with the sharp increase in the number of vulnerabilities and the speed of discovery in recent years,it is becoming more and more important to collect,manage and exploit existing vulnerabilities.On this basis,as an important part of information security infrastructure,vulnerability database can not only store basic information,characteristics,solutions and other attributes of various vulnerabilities,but also quickly respond to vulnerability information and disseminate it in a timely manner to improve the public's ability to deal with information security threats.At the same time,with the development of machine learning,natural language processing and other technologies,more and more researchers are paying attention to the application of artificial intelligence technology in intelligently processing vulnerability information.The vulnerability database can serve as an important data foundation and play an increasingly important role in the field of computers.Vulnerability database research has become a popular research topic in the field of computer science.This paper is the first comprehensive survey of research on vulnerability databases in recent years,from multiple perspectives including basic concepts,background knowledge,theoretical frameworks,and innovation points.The specific contents include the following:(1)Reviewed the background knowledge of vulnerabilities and vulnerability databases,including definitions and classifications,and also elaborated on the relationship between vulnerability publication and vulnerability databases;(2)Introduced the development status of vulnerability databases,and also discussed standards related to vulnerability database construction;(3)Classified and summarized the existing research progress in vulnerability information collection,management,filling of incomplete fields and quality evaluation around the construction of vulnerability databases;(4)Classified and summarized existing research on the application of vulnerability database data in vulnerability prediction and scanning,vulnerability repair,software security and component analysis,network attack modeling,security situational analysis,and vulnerability feature regularity and correlation mining;(5)Discussed the challenges and future research directions of vulnerability database research.
vulnerabilityvulnerability reportvulnerability databaseautomated assessment of vulnerabilitiesvulnerability lifecycle