Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network asset fingerprint identification method, system and equipment

A technology of fingerprint identification and network assets, which is applied in the field of network security, can solve problems such as inefficient event handling, lax asset supervision, and easy-to-attack and difficult-to-prevent security loopholes, achieving the effect of reducing hidden dangers

Active Publication Date: 2022-04-29
国家工业信息安全发展研究中心
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a network asset fingerprint identification method, system, and equipment, which are used to solve the problems of lax asset supervision, easy attack and difficult prevention of security loopholes, and inefficient event handling in existing networked systems and equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset fingerprint identification method, system and equipment
  • Network asset fingerprint identification method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The embodiment of the present invention relates to a method, system, and device for network asset fingerprint identification and risk warning. The technical solution of the embodiment of the present invention detects surviving hosts in network space through an asynchronous stateless scanning mechanism; identifies surviving hosts through task distribution and scheduling strategies The asset fingerprint information and update the fingerprint weight; use the method based on fingerprint feature rule matching to discover potential risks of host assets; execute custom vulnerability scanning programs and vulnerability mining tools to verify potential risks, and issue risk warning notifications.

[0066] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network asset fingerprint identification method, system and device. The method includes: detecting surviving hosts under a target IP segment through an asynchronous stateless scanning mechanism, saving the surviving host addresses in an asset scanning queue, and scanning all the surviving hosts. The surviving hosts in the asset scanning queue perform asset identification task distribution; the initial fingerprint hit rate is set for the pre-stored common asset fingerprint data, and the asset detection engine is called to actively detect the surviving hosts in the asset scanning queue based on the fingerprint hit rate. Asset fingerprint identification is performed by matching with fingerprint rule signature database.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network asset fingerprint identification method, system and equipment. Background technique [0002] With the rapid development of network technology, the country pays more and more attention to network security. The number of hosts connected to the Internet is increasing at an alarming rate. As network assets are the basis for the normal operation of business systems, systematic supervision is very necessary. According to Gartner, currently less than 25% of organizations in the world have proper IT asset management mechanisms, which have brought serious security risks to network assets. How to effectively fingerprint and manage network assets has become a challenge for most enterprises and organizations. huge challenge. Therefore, how to fully grasp the network asset information related to open ports, protocols, domain names, device types, models, manufacturers, appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/0263H04L63/1433H04L63/10H04L63/20
Inventor 刚占慧汪礼俊张洪杨安孙立立鞠远黄海波杨杰赵凯丽朱丽娜张晓帆高羽茜陈皓李俊
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products