Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active network safety loophole detector

A network security, active technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem of not well integrated visual display, shorten the detection running time, reduce the false alarm rate, detection accuracy high effect

Inactive Publication Date: 2009-02-18
XI AN JIAOTONG UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

No matter whether the model detection technology or the model using graph analysis technology is used, the problems of organic integration with vulnerability detection results, expansion in large-scale networks or visual display of attack paths are not well handled.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active network safety loophole detector
  • Active network safety loophole detector
  • Active network safety loophole detector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0040] 1. The composition of the security vulnerability detector AVCS

[0041] Such as figure 1 As shown, the composition of the active network security vulnerability detector AVCS is given, which is divided into three parts from the physical distribution: detection agent, data center and analysis console. Wherein, the detection agent is distributed on each host in the network and runs in the background mode. When a "data collection request" is received, OVAL is used to collect the system characteristic information of the machine, and the data is safely uploaded to the data center for later evaluation and analysis.

[0042] The analysis console is the graphical user interface of the system. The administrator can set the host to be evaluated, connect to the database, detection strategy, and evaluation conditions according to the evaluation needs. When the "...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses an active network safety leakage detector composed of three control modules of a detect agent, a data center and an analysis control stand, among which, the detection agent collection system matches the information and upwards it to the data center, the analysis control stand analyzes information stored in the data center to identify the host leakage by the OVAL leakage definition and carry out the associate analysis of attack / leakage by the predicate logic theory to find out the safety problem brought with the leakage combination to display potential attack paths in sight.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to an active network security loophole detector AVCS (Active Vulnerability Checker for computer network Systems), which is used for detecting network security loopholes. Background technique [0002] Vulnerability is the root of all network security problems. Vulnerability detection is the basis for solving network security problems. Only by understanding the security risks existing in the system can we achieve targeted defense and avoid blind protection. As soon as the vulnerability detection technology was proposed, it attracted great attention in the field of network security, and it was listed as the mainstream research direction of network security together with firewall, intrusion detection, encryption and virus prevention technologies. [0003] From domestic and foreign database retrieval and literature analysis, the detection of known vulnerabil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 郑庆华管晓宏陈秀真林晨光赵婷姚婷婷
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products