A security baseline system and its method for realizing security inspection

A security baseline and security inspection technology, applied in the field of network security, can solve problems such as inability to respond to vulnerabilities in real time, fixed security baseline database, and inability of business personnel to perform security inspections.

Active Publication Date: 2017-08-08
ALIBABA GRP HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, for a network with abundant changes like the Internet field, the existing security baseline products have the following shortcomings: the security baseline library is relatively fixed, and cannot respond to newly discovered vulnerabilities in real time; Customized Security Checks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security baseline system and its method for realizing security inspection
  • A security baseline system and its method for realizing security inspection
  • A security baseline system and its method for realizing security inspection

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0087] In the first embodiment, it is assumed that the detailed information of the vulnerability includes: the basic software name (name) myname discovers the vulnerability; the affected version number (version) is m.n1, m.n2, m.n3; the cause of the vulnerability is its file (file) a The value (val) of the field (key) b is c; the standard value (std) of the field b is d; the vulnerability CVE ID is 1234; the vulnerability description (info) is xyz; the vulnerability discovery time (time) is YY-MM- DD.

[0088] The vulnerability information received by the linkage processing unit is:

[0089] {name: myname, version: m.n1|m.n2|m.n3, file: a, key: b, val: c, std: d, CVE_ID: 1234, time: YY-MM-DD, info: xyz };

[0090] The linkage processing unit combines three sets of index values ​​(myname,m.n1), (myname,m.n2), (myname,m.n3) according to the name and version fields, and queries in the asset information base based on these conditions Identify the devices that may be affected, as...

no. 2 example

[0095] In the second embodiment, it is assumed that the vulnerability summary information includes: a discovered vulnerability (name), which is represented by a dangerous process p1, and the vulnerability CVE ID is 1234; the vulnerability description (info) is xyz; the vulnerability discovery time (time) is YY-MM- DD.

[0096] The vulnerability information received by the linkage processing unit is: {name:p1, version:null, file:null, key:null, val:null, std:null, CVE_ID:1234, time:YY-MM-DD, info:xyz };

[0097] The linkage processing unit combines the index value (p1, null) according to the name and version fields, and uses this as a condition to query the potentially affected equipment in the asset information database, and the result is empty (null).

[0098] The linkage processing unit assembles the vulnerability information, the target device, and the baseline template identifier (assumed to be tempalte:T1 in the second embodiment) to generate inspection information as: {n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a security baseline system and a method for implementing security checks, including a vulnerability information acquisition unit actively acquiring vulnerability information; a linkage processing unit determining the target device according to the obtained vulnerability information, and generating check information; the security check is the unit according to the generated Check information to perform a security check on the target device. This application actively acquires newly discovered vulnerability information through active means, adapts to the network with rich changes in the Internet field, and thus achieves real-time response to newly discovered vulnerabilities. Furthermore, this application establishes a user security baseline library according to user customization requests, allowing users to call their own customized security rules to perform security checks on the system, thereby meeting the customizable requirements of security checks.

Description

technical field [0001] The application relates to network security technology, especially to a security baseline system and a method for implementing security inspection. Background technique [0002] With the deepening influence of the Internet on society, the losses caused to people after security incidents are also becoming more and more serious. Security operation and maintenance personnel and managers increasingly hope to block security incidents before they occur by formulating security specifications and conducting security checks on devices on the entire network. The security baseline is a product that has security specifications and checks the compliance of all network devices. Among them, the security baseline refers to the minimum security guarantee of an information system, that is, the most basic security requirements that the information system needs to meet. In the engineering field, the security baseline refers to security products that ensure that the infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 郭锐
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products