Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network system safety protection method and device and related equipment thereof

A network system and security protection technology, applied in the field of network security, can solve problems such as command execution, inability to clearly and accurately judge security risks, and inability to meet complex security requirements for security attack protection, and achieve high accuracy.

Inactive Publication Date: 2020-04-21
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Due to the rapid development of informatization construction, the efficiency and accuracy requirements for online system attack defense are constantly improving, and the traditional manual intervention method can no longer meet the complex security requirements of modern security attack defense
[0003] At present, in terms of security monitoring of the cloud, management platform, terminal, and Internet environment, there is a lack of effective and targeted technical means that can better meet the business needs of real-time attack defense, and it is impossible to fully grasp the system security situation and attack resistance capabilities , cannot clearly and accurately judge the existing security risks, and effectively warn in advance, and cannot deal with the security incidents in a standardized and effective manner
For example, when there is a network attack in the online operation scenario of the enterprise, problems such as information leakage, unauthorized control, system denial of service, and command execution are prone to occur, which will lead to economic and reputation losses of the enterprise; when the school network management system is operating online. When there are internal and external network attacks, problems such as data tampering, batch student information leakage, and academic confidential information leakage are prone to occur, which will lead to accidents in student management and the latest national research leaks, etc.
[0004] In the existing technology, in order to solve the above problems, foreign manufacturers are based on the research of security threats in simple network environments. Basically, no manufacturer can fully provide automated attack and defense drills for complex network environments, so as to provide automated penetration testing and security defense. , and fully complies with the relevant platform systems of my country's information security level protection construction and inspection requirements; however, domestic manufacturers cannot fully meet the requirements of the automated attack and defense drill platform under the complex network environment of big data in terms of data mining, security accumulation, industry understanding, etc. Requirements at all levels involved in construction and safety technology construction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network system safety protection method and device and related equipment thereof
  • Network system safety protection method and device and related equipment thereof
  • Network system safety protection method and device and related equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The core of this application is to provide a network system security protection method, which can effectively realize automation, verifiability, high efficiency, high-precision penetration testing and real-time system defense; another core of this application is to provide a A network system security protection device, system, and computer-readable storage medium also have the above beneficial effects.

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative eff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network system safety protection method, which comprises the steps of performing information collection according to a received protection instruction to obtain network system information; vulnerability detection is carried out on the network system information to obtain network vulnerabilities; attacking the network vulnerability by using a preset automatic attack model;obtaining an attack result corresponding to the successfully attacked network vulnerability; performing vulnerability repair on the network vulnerability according to the attack result; the network system safety protection method can effectively realize automatic, verifiable, high-efficiency and high-precision penetration test and real-time system defense. The invention also discloses a network system safety protection device and system, and a computer readable storage medium, which all have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network system security protection method, and also relates to a network system security protection device, system and computer-readable storage medium. Background technique [0002] Due to the rapid development of informatization construction, the efficiency and accuracy requirements for online system attack defense are constantly improving, and the traditional manual intervention method can no longer meet the complex security requirements of modern security attack defense. [0003] At present, in terms of security monitoring of the cloud, management platform, terminal, and Internet environment, there is a lack of effective and targeted technical means that can better meet the business needs of real-time attack defense, and it is impossible to fully grasp the system security situation and attack resistance capabilities , cannot clearly and accurately judge t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441H04L63/20
Inventor 周捷范渊吴卓群
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products