Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method and device, computer equipment and memory medium

A vulnerability detection and computer program technology, applied in the computer field, can solve the problems that the physical firewall does not have the ability to distinguish ports and applications, and cannot guarantee the security of application servers, so as to achieve the effect of improving security

Active Publication Date: 2018-07-06
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, physical firewalls are generally used to protect the security of application servers, but physical firewalls do not have the ability to distinguish ports and applications, so they can only defend against traditional attacks, so traditional firewalls cannot guarantee the security of application servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, computer equipment and memory medium
  • Vulnerability detection method and device, computer equipment and memory medium
  • Vulnerability detection method and device, computer equipment and memory medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0048] The vulnerability detection method provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the cloud platform communicates with terminals and application servers through the network. The cloud platform can be configured through physical firewalls. For example, each physical firewall device is divided based on virtual resources to obtain multiple virtual firewall devices. Each virtual firewall device Corresponding to different application servers respectively, so as to realize the security guarantee for the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vulnerability detection method and device, computer equipment and a memory medium. The method comprises the steps of receiving application data access requests sent by terminals, wherein the application data access requests carry application identities; carrying out basic detection on the application data access requests through utilization of a first virtual firewall located in an infrastructure layer and marking the application data access requests with vulnerabilities; selecting third virtual firewalls corresponding to the application identities from second virtual firewalls located in a software operation layer; carrying out advanced detection on the application data access requests detected by the first virtual firewall through utilization of the selected third virtual firewalls; and intercepting the marked application data access requests in which the vulnerabilities exist when the third virtual firewalls detect that the vulnerabilities exist in the marked application data access requests, wherein the application data access requests are the requests detected by the third virtual firewalls. According to the method, the security of application servers can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a vulnerability detection method, device, computer equipment and storage medium. Background technique [0002] With the popularization of application programs, users and application program developers pay more and more attention to the security of the application programs, that is, the security of the application server corresponding to the application programs. [0003] However, at present, physical firewalls are generally used to protect the security of application servers, but physical firewalls do not have the ability to distinguish ports and applications, so they can only defend against traditional attacks, so traditional firewalls cannot guarantee the security of application servers. Contents of the invention [0004] Based on this, it is necessary to provide a vulnerability detection method, device, computer equipment and storage medium capable of improving t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0263H04L63/1433H04L63/0218H04L67/10
Inventor 李洋
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products