Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability fingerprint silent analysis monitoring method, system, device and medium

A vulnerability and fingerprint technology, applied in the field of software development, can solve the problems of incapable of intelligent scanning analysis, incapable of intelligent scanning, time-consuming and labor-intensive, etc., to improve the level of network security protection, standardize network security behavior, and reduce internal loopholes Effect

Pending Publication Date: 2022-01-18
INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, network attacks emerge in endlessly. If internal vulnerabilities cannot be discovered and repaired in time, network security behaviors can be regulated, and existing security risks can be discovered and dealt with in advance, it will have an irreversible impact on the business system
[0003] However, the traditional vulnerability scanning technology has the following problems: First, it is difficult to quickly adapt to the changing needs of security risks
Second, there are many false negatives and false positives of security risks
Due to the complexity and diversity of the operating system, middleware, database and other environments, some scanning tools detect vulnerabilities through the system version number, and there are false positives and false positives, which require further analysis and confirmation by security operation and maintenance personnel, which is time-consuming and labor-intensive.
Third, it is impossible to intelligently scan and analyze
Traditional scanning tools judge the service based on the port, and then call the script to attack. There may be situations where the port cannot be detected due to port changes
And focusing on a single vulnerability, it is impossible to conduct a unified intelligent scan for most of the vulnerabilities, and it is impossible to quickly and accurately check and intelligently analyze the vulnerabilities in order to make a unified judgment on the current network vulnerability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability fingerprint silent analysis monitoring method, system, device and medium
  • Vulnerability fingerprint silent analysis monitoring method, system, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Embodiment 1 of the present invention proposes a method for silent analysis and monitoring of vulnerability fingerprints, which is dedicated to reducing internal vulnerabilities, standardizing network security behaviors, discovering and handling existing security risks in advance, greatly improving the company's network security protection level, and timely discovering equipment and The attack risk faced by the system. Such as figure 1 It is a flow chart of a method for silent analysis and monitoring of vulnerability fingerprints proposed in Embodiment 1 of the present invention;

[0041] In step S101, the vulnerability script of the vulnerability scanning engine is trained, and the trained vulnerability scanning engine detects the vulnerability samples according to the custom vulnerability framework.

[0042] The invention adopts a vulnerability scanning engine to accurately scan operating system vulnerabilities, application system framework vulnerabilities and common...

Embodiment 2

[0066] Based on the method for silent analysis and monitoring of vulnerability fingerprints proposed in Embodiment 1 of the present invention, Embodiment 2 of the present invention also proposes a system for silent analysis and monitoring of vulnerability fingerprints. The system includes: a training module, a scanning module and a surveying and mapping module;

[0067] The training module is used to train the vulnerability script of the vulnerability scanning engine, and the trained vulnerability scanning engine detects the vulnerability samples according to the custom vulnerability framework;

[0068] The scanning module is used to train the vulnerability situation by using the modeling algorithm and analyze the vulnerability scanning results through self-learning after the vulnerability sample detection is completed;

[0069] While the surveying and mapping module is used for vulnerability scanning, cyberspace surveying and mapping functions are added to generate asset repor...

Embodiment 3

[0090] The invention also proposes a device comprising:

[0091] memory for storing computer programs;

[0092] When the processor is used to execute the computer program, the method steps are as follows:

[0093] Such as figure 1 It is a flow chart of a method for silent analysis and monitoring of vulnerability fingerprints proposed in Embodiment 1 of the present invention;

[0094] In step S101, the vulnerability script of the vulnerability scanning engine is trained, and the trained vulnerability scanning engine detects the vulnerability samples according to the custom vulnerability framework.

[0095] The invention adopts a vulnerability scanning engine to accurately scan operating system vulnerabilities, application system framework vulnerabilities and common middleware vulnerabilities such as weblogic and tomcat.

[0096] In order to ensure the accuracy of the vulnerability scripts, each script has undergone targeted training no less than 3 times, and has been optimiz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability fingerprint silent analysis monitoring method, system and device and a medium, and the method comprises the steps of training a vulnerability script of a vulnerability scanning engine, and enabling the trained vulnerability scanning engine to detect a vulnerability sample according to a self-defined vulnerability framework; after the vulnerability sample detection is completed, training vulnerability conditions by adopting a modeling algorithm and analyzing vulnerability scanning results through self-learning; and adding a network space surveying and mapping function to generate an asset report while scanning the vulnerability, and displaying the asset report by adopting a UI (User Interface). Based on the method, the invention further provides a vulnerability fingerprint silent analysis monitoring system and device and a storage medium. According to the invention, the vulnerability framework is self-defined, and the latest vulnerability is timely compiled and uploaded to detect the script, so that the emergency response is timely and accurate. The invention aims at reducing internal vulnerabilities, standardizing network security behaviors, discovering and handling existing potential safety hazards in advance, greatly improving the network security protection level and discovering attack risks faced by equipment and a system in time.

Description

technical field [0001] The invention belongs to the technical field of software development, in particular to a method, system, device and medium for silent analysis and monitoring of vulnerability fingerprints. Background technique [0002] At present, network attacks emerge in endlessly. If internal vulnerabilities cannot be discovered and repaired in time, network security behaviors can be regulated, and existing security risks can be discovered and dealt with in advance, the business system will be irreversibly affected. [0003] However, the traditional vulnerability scanning technology has the following problems: First, it is difficult to quickly adapt to the changing needs of security risks. Using traditional vulnerability scanning equipment, there are problems of slow update of the security library and poor real-time performance. After the 0day vulnerability is exposed, it is impossible to quickly and effectively verify the vulnerability of the system, equipment, etc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06F11/36
CPCG06F21/577G06F21/563G06F11/3684G06F11/3688
Inventor 李明曲延盛王云霄黄华张婕马琳赵丽娜程兴防盛华张文斌李宁刘维特任乐
Owner INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products