Vulnerability mining detection method, server, device and system

A technology of vulnerability mining and detection methods, applied in the Internet field, can solve problems such as user information security, user personal and property losses that threaten the client, and achieve the effect of large probe coverage.

Active Publication Date: 2016-11-16
360 TECH GRP CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are loopholes in many files used by people in the process of using the Internet. The loopholes in these files give malicious developers an opportunity. Malicious developers can use the loopholes in these files to attack the client where the files are located. Obtaining the personal information of the client users, threatening the information security of the client users, and causing losses to the users in terms of personal and property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability mining detection method, server, device and system
  • Vulnerability mining detection method, server, device and system
  • Vulnerability mining detection method, server, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0070] figure 1 A flow chart of a vulnerability mining and detection method according to an embodiment of the present invention is shown, and the implementation process of the solution is described from the server side. like figure 1 As shown, the method includes:

[0071] Step S110, obtaining suspicious sample logs uploaded by the client.

[0072] In this step, when the client finds that a file may have a loophole during operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability mining detection method, server, device and system. The method comprises the following steps: acquiring suspicious sample logs uploaded by clients; performing duplication elimination on the acquired suspicious sample logs; and inputting suspicious sample logs left after duplication elimination into a sandbox, performing scanning to obtain a scanning log, and determining whether samples corresponding to the suspicious sample logs have vulnerabilities or not according to the scanning log. In the scheme, the clients are taken as probes spreading all over the Internet to collect the suspicious sample logs corresponding to suspicious files, so that relevant information of the samples in which vulnerabilities exist possibly in the Internet can be mined comprehensively. Then, samples in which security vulnerabilities exist really are determined from the samples in which the vulnerabilities exist possibly according to the scanning log, so that actual security situations of the samples are determined. Scanning is performed in the sandbox on a server side, so that an enclosed running environment is provided for the suspicious sample logs, and the security of the server side in a detection process is ensured.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a vulnerability mining and detection method, server, device and system. Background technique [0002] With the continuous development of Internet technology, people use the Internet more and more frequently. Through the Internet, various matters such as work, study, life, and entertainment can be carried out, which brings great convenience to people. However, there are loopholes in many files used by people in the process of using the Internet. The loopholes in these files give malicious developers an opportunity. Malicious developers can use the loopholes in these files to attack the client where the files are located. Obtaining the personal information of the client users threatens the information security of the client users and causes losses to the users in terms of personal and property. [0003] Therefore, how to effectively and comprehensively mine and detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 魏自立丁卯胤冯鑫李浩李威
Owner 360 TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products