Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Loophole severity assessment and repair method

A technology of severity and vulnerability, which is applied in the field of vulnerability severity assessment, can solve the problem that the priority of vulnerability repair cannot be determined, and achieve the effect of avoiding major harm and improving security

Inactive Publication Date: 2017-05-03
NORTHWEST UNIV(CN)
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the above-mentioned deficiencies in the prior art, and provide a vulnerability severity assessment and repair method to thoroughly clarify the severity of the vulnerability and then determine the priority of repair, fundamentally solve the problem that the priority of vulnerability repair cannot Identify the problems, repair the vulnerabilities, avoid potential major harm to the computer system, and improve the security of the computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loophole severity assessment and repair method
  • Loophole severity assessment and repair method
  • Loophole severity assessment and repair method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described in detail below in combination with specific embodiments. However, it should not be understood that the scope of the above subject matter of the present invention is limited to the following embodiments, and all technologies realized based on the content of the present invention belong to the scope of the present invention.

[0047] An embodiment of the present invention shows a schematic diagram of a vulnerability severity assessment method, the method comprising:

[0048] S101. Extract M vulnerabilities of the target host, and calculate a static severity assessment result of each vulnerability according to at least one important attribute information of each vulnerability;

[0049] S102. When the static severity assessment results of N vulnerabilities among the M vulnerabilities are the same, calculate a dynamic severity quantitative score for each of the N vulnerabilities;

[0050] S103. When the dynamic severity quant...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a loophole severity assessment and repair method comprising the steps of extracting M loopholes of a target host, and computing a static severity assessment result according to at least one piece of significant attribute information of each loophole; when the static severity assessment results of the N loopholes of the M loopholes are the same, computing a dynamic severity quantitative score of each loophole of the M loopholes; when the dynamic severity quantitative scores of the P loopholes of the N loopholes are the same, acquiring a timing sequence impact factor of each loophole of the P loopholes, and determining the loophole with the maximum timing sequence impact factor to be the loophole with the highest priority. According to the method provided by the invention, the problem that the repair priority of loophole cannot be determined is fundamentally solved, and accordingly the loophole can be repaired, the situation that a computer system has a potential major hazard is avoided, and security of the computer system is improved.

Description

technical field [0001] The invention relates to the field of vulnerability severity assessment, in particular to a vulnerability severity assessment and repair method. Background technique [0002] With the development of the Internet, the scale of Internet users and the penetration rate of the Internet are increasing year by year. However, with the emergence of endless security problems, the high outbreak of loopholes is one of the important reasons for endangering network security. Vulnerabilities refer to defects in computer systems in terms of requirements and design. These defects exist in all levels and links of computer systems. Once exploited by attackers, they will cause major harm to the computer system and affect its normal operation. In the situation where the number of vulnerabilities is increasing day by day, how to assess the severity of the vulnerabilities, and on this basis, it is very important to repair the vulnerabilities. [0003] At present, the severi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 孙骞高岭付志耀王海杨旭东罗昭
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products