Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Static and dynamic analysis technology-based host system security evaluation method

A host system, static security technology, applied in computer security devices, transmission systems, digital transmission systems, etc., can solve the problems of difficult to find logical security risks, time-consuming and laborious, and achieve the effect of more comprehensive analysis results

Active Publication Date: 2010-11-24
STATE GRID ELECTRIC POWER RES INST +2
View PDF1 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing host security assessment mainly relies on manual analysis and vulnerability scanning, which is time-consuming and labor-intensive. It focuses on routine security testing such as account security and patch vulnerabilities, and it is difficult to find deep-seated logical security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static and dynamic analysis technology-based host system security evaluation method
  • Static and dynamic analysis technology-based host system security evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with accompanying drawing.

[0047] This method collects static security data such as host system profile parameters, service lists, and process information by uploading a static data collector. , and dynamically analyze the service response, vulnerability matching, and in-depth logical security of the host system. The data to be analyzed includes the following:

[0048] 1) Operating system language, version, IP address and other basic information, account information, network configuration, sharing, services, permission information of key files, patch and vulnerability information;

[0049] 2) Detailed version of database system, listener service security, account password security, initialization parameter setting security, account password policy, permission setting of stored procedure, startup account permission, non-essential service, log audit strategy and authentication mode and table usage of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a static and dynamic analysis technology-based host system security evaluation method, which analyzes and evaluates whether a host system has a security risk. The system comprises a static data acquisition unit, a dynamic data acquisition unit and a remote analysis server. The method for performing security elevation on the host system comprises the following processes of:uploading the static data acquisition unit; acquiring static security data such as a profile parameter, service list, process information and the like of the host system; performing comprehensive correlation analysis by using a remote analyzer; performing dynamic analysis on service response, vulnerability matching, deep logic security and the like of the host system according to a static security data analysis result; and determining whether the host system has the security risk by a static and dynamic analysis technology combined method.

Description

technical field [0001] The invention relates to a security assessment method in the technical field of information security, in particular to a host system security assessment method based on static and dynamic analysis techniques. Background technique [0002] As one of the important basic industries of the country, the electric power industry, with the deepening of electric power informatization, information security issues have seriously threatened the safe and stable operation of the power grid. In order to prevent malicious attacks on power information systems and networks and power system accidents caused by them, the National Power Secondary System Safety Protection Expert Group and Working Group proposed the "National Power Secondary System Safety Protection Overall Plan", the National Electric Power Regulatory Commission The committee passed the "Regulations on the Safety Protection of the Secondary Power System" (Decree No. 5 of the Electric Power Regulatory Commis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L12/24G06F21/57
Inventor 朱世顺郭骞唐汗青林为民余勇从正海杨维永
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products