Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A scheduling method and system for website security protection capabilities based on workflow

A technology of security protection capability and scheduling method, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as low matching efficiency, disordered scheduling, website security monitoring hanging horses, etc., and achieve high-speed security. The effect of attacking, improving query efficiency, and improving work efficiency

Active Publication Date: 2022-03-18
江苏移动信息系统集成有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The use scheduling and data sharing between multiple security resource capabilities in the prior art still remain at the level of "going it alone". For the responsibility of "website security" protection for target customers, host vulnerability scanning can only detect Deployed hosts perform vulnerability detection. Web vulnerability scanning can only detect exposed surface risk vulnerabilities. Website security can only monitor Trojans and tamper detection. The above methods still remain at the superposition of security resource capabilities one by one, artificial security resource capabilities In terms of scheduling, it is difficult to meet the needs of current security development, resulting in at least the following problems in the existing technology:
[0004] 1. When serving target customers, security resource capabilities are transitionally dependent on manual scheduling, lacking systematic automatic scheduling tools and algorithms. 2. A series of security resource capability collections can only be retrieved one by one and then matched with security resources based on the search results capabilities, resulting in low matching efficiency, and the threat cannot be retrieved quickly and efficiently when being attacked. Third, security resource capabilities are not classified and graded, and forced to use one-by-one retrieval and matching security resource capabilities, and scheduling is out of order. Fourth, data with multiple security resource capabilities The results are independent, and data sharing cannot be formed. Fifth, it is impossible to form an effective historical risk surface for each customer, and it is more difficult to estimate potential risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A scheduling method and system for website security protection capabilities based on workflow
  • A scheduling method and system for website security protection capabilities based on workflow
  • A scheduling method and system for website security protection capabilities based on workflow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the following description, numerous specific details are given in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without one or more of these details. In other examples, some technical features known in the art are not described in order to avoid confusion with the present invention.

[0033] The present application discloses a website security protection capability scheduling method that automatically schedules security resource capabilities, can quickly and efficiently retrieve threats, effectively schedules security resource capabilities by classification and hierarchy, shares data, and can estimate potential risks.

[0034] The scheduling method includes: S1. The access registration module collects security resource pool capabilities.

[0035] S2. The hierarchical management module reads the security resource pool capability information o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a scheduling method and system for website security protection capabilities based on workflow, and belongs to the field of data processing methods specially suitable for supervision. The scheduling method includes: S1. Sorting out all security resource pool capabilities, S2. Hierarchically classifying the security resource pool capabilities, S3. Pre-labeling the security resource pool capabilities, S4. Making a decision tree for website security protection Chain pre-initialization, S5. Match the machine learning algorithm, dynamically adjust the left and right opportunity weight values ​​of each node, and gradually form the effective risk parameters of each node for each customer, S6. Based on the phased data of website security protection, sort out the scheduled time Segment network security protection data, providing target customer prediction results. The invention improves the work efficiency of security resource scheduling, solves the problem of non-sharing of security resource pool data, reduces the search time of security resources, and improves the hit efficiency of security resources.

Description

technical field [0001] The invention relates to the field of data processing methods specially suitable for supervision, in particular to a scheduling method and system for website security protection capabilities based on workflow. Background technique [0002] With the development of the Internet, network communication technology and network interception technology are also developing rapidly, and new attack technologies emerge in an endless stream. While bringing convenience to consumers, the risks are becoming more and more obvious. In addition to the unilateral risks of traditional cyber attacks, high interaction risks, large-scale personal information leakage risks, government and financial data leakage, and risks of tampering have increasingly strong impacts on mass consumers. [0003] The use scheduling and data sharing between multiple security resource capabilities in the prior art still remain at the level of "going it alone". For the responsibility of "website se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F16/22G06N20/00
CPCH04L63/20G06F16/2246H04L63/1433G06F18/24323
Inventor 董陵童恩王宏图孙迎春吴刚陈程周翔
Owner 江苏移动信息系统集成有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products