Similar loophole inquiry method based on text mining

The invention relates to a similar loophole inquiry method based on text mining, belonging to the technical field of computer information security. The method comprises the following steps of: A, preprocessing the loophole data; B, inputting for the similar loophole inquiry; C, processing the loophole record data; and D, outputting the result of the similar loophole inquiry. The method provided by the invention has the advantages that: unclear loophole information described by text is clarified, thereby facilitating the intelligent processing of the loophole record data by a computer system; the inquiry method is different from the inquiry based on keyword matching that the inquiry result is output according to the similarity and the inquiry is fuzzy inquiry; and moreover, the mode and law hidden in the loophole data can be mined, thereby providing a foundation for further application of the loophole data.