Method and system for detecting network security

A network security and detection method technology, applied in the field of computer networks, can solve problems such as hazards, Trojan horse programs, and loss of security of website servers, so as to avoid potential safety hazards, avoid malicious attacks, and ensure security.

Inactive Publication Date: 2012-09-12
KUNLUNXIN TECH BEIJING CO LTD
View PDF7 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the website server may be vulnerable to malicious attacks. On the one hand, the website server loses its security, and in addition, the computer terminal accessing the website server is threatened by the network, for example, the computer terminal may be infected with a virus or a Trojan horse program.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting network security
  • Method and system for detecting network security
  • Method and system for detecting network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Reference will now be made in detail to embodiments of the invention, examples of which are illustrated in the accompanying drawings. While specific embodiments have been shown, it should be understood that the invention is not meant to be limited to those specific embodiments. On the contrary, the invention includes alternatives, modifications and equivalents within the spirit and scope of the appended claims. Numerous specific details are set forth in order to provide a thorough understanding of the subject matter presented herein. It will be apparent, however, to one of ordinary skill in the art that the subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present embodiments.

[0030] Although the terms first, second etc. may be used herein to describe various elements, these elements should not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for detecting network security. The method comprises the following steps: carrying out security analysis and evaluation on a website including the leak, which is submitted by a user; determining the type and quantity of the leak according to the analysis and evaluation results; evaluating the website to determine the security level of the website according to the type and quantity of the leak; and repairing the leak according to the type of the leak. According to the method and the system for detecting the network security, the leak of the website and the security level of the website can be effectively analyzed, and the leak can be repaired online, thereby ensuring the security of the network and avoiding the intrusion of a hacker.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a network security detection method and system. Background technique [0002] A computer network (eg, the Internet) involves data exchange between terminal devices (eg, laptops, tablets, or smartphones) and web servers (eg, web servers). A Domain Name Server (DNS) receives the access request, determines the Internet Protocol (IP) address of the web server, and forwards the access request to the web server. When the website server receives the access request, it returns the information of the visited website to the terminal device. In many cases, the source code of a website may have a security hole due to, for example, the inexperience of the person developing the source code. Therefore, the website server may be vulnerable to malicious attacks. On the one hand, the website server loses its security, and on the other hand, the computer terminal accessing the website s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 马杰冯景辉
Owner KUNLUNXIN TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products