Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection processing method and device, computer and readable storage medium

A processing method and vulnerability detection technology, which is applied in the computer field, can solve problems such as false positives of vulnerability scanning, inability to obtain virtual machines, and low efficiency of virtual machine vulnerability detection, and achieve the effect of improving accuracy and efficiency

Pending Publication Date: 2022-07-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the deployment of the virtualization platform by the cloud vendors has been modified and compiled by themselves, the version numbers used by each cloud vendor are not uniform, and vulnerability scanning will cause a large number of false positives; Vulnerability detection, due to the isolation of virtualized virtual machines (visual personalcomputers, VPCs), the virtualization configuration of the parent machine is a black box for vulnerability scanning systems or exploit tools, and it is impossible to obtain kernel-based virtual machines (kernel-based virtual machine, KVM) and other host machine configuration information, which makes the verification information of the virtualization platform incomplete, resulting in inaccurate virtual machine vulnerability detection results.
[0003] Through the verification method tailored for specific vulnerabilities, the causes and principles of specific vulnerabilities are analyzed, and a customized vulnerability detection method is obtained. Since the vulnerabilities of virtual machines are not fixed, the verification and analysis methods are not fixed. Therefore, this method It is necessary to understand the details and causes of each virtualization vulnerability, as well as the principle and trigger details of each vulnerability, which leads to low efficiency of virtual machine vulnerability detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection processing method and device, computer and readable storage medium
  • Vulnerability detection processing method and device, computer and readable storage medium
  • Vulnerability detection processing method and device, computer and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

test Embodiment 702

[0159] Specifically, see Figure 7 , Figure 7 It is a schematic diagram of a code function test scenario provided by an embodiment of the present application. like Figure 7 As shown, the host generates a code test case 702 according to the repair program code 701, runs the code test case 702, and performs a case test on the repair program code 701. If the use case test for the repair program code 701 passes, then the repair program code 701 Perform grayscale processing to obtain a grayscale test code 703 . The host computer updates the target virtualization component according to the grayscale test code 703 to obtain the grayscale virtualization component 704, and the grayscale virtualization component 704 is to be released. In 705, the computer device whose usage frequency of the virtual platform is less than the usage test threshold is determined as the test device 7051, and the grayscale virtualization component 704 is sent to the test device 7051 to be released, so th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vulnerability detection processing method and device, a computer and a readable storage medium, and the method comprises the steps: detecting a target virtualization component deployed in a host machine, and searching a component management channel associated with the target virtualization component; acquiring virtualized component vulnerability information published by the component management channel; detecting a virtual running component in a running state in the target virtualized component, and if a vulnerability associated component in the virtualized component vulnerability information exists in the virtual running component, determining that target component vulnerability information exists in the virtualized component vulnerability information; and updating the target virtualized component based on the vulnerability repair data related to the vulnerability information of the target component. The functions used for realizing the assembly include but are not limited to cloud service, cloud storage, cloud computing, cloud communication, middleware, safety service, vehicle-road cooperation, content distribution, big data, an AI platform, a map platform and the like. By adopting the method and the device, the accuracy of vulnerability detection processing can be improved.

Description

technical field [0001] The present application relates to the field of computer technologies, and in particular, to a method, device, computer, and readable storage medium for vulnerability detection and processing. Background technique [0002] Virtualization technology is the cornerstone of the cloud platform. If there is a security risk in the virtualization platform, it may damage the security and stability of the cloud host, cause the cloud host to be manipulated by attackers, leak sensitive data, and even affect the normal operation of the entire Internet. . Therefore, the vulnerability detection of virtual machines is extremely important. At present, the vulnerabilities of virtual machines are generally detected through vulnerability scanning systems or vulnerability exploitation tools, such as security assessment systems and system vulnerability scanning and analysis software. Determine whether the virtualization platform is affected by enumerating the vulnerabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F9/455
CPCG06F21/577G06F9/45558G06F2009/45587
Inventor 刘志高董志强
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products