Security baseline system and method thereof for implementing security checks

A security baseline and security inspection technology, applied in the field of network security, can solve problems such as the inability to respond to vulnerabilities in real time, the inability of business personnel to perform security inspections, and the fixed security baseline library

Active Publication Date: 2014-10-29
ALIBABA GRP HLDG LTD
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, for a network with abundant changes like the Internet field, the existing security baseline products have the following shortcomings: the security baseline library is relatively fixed, and cannot respond to newly discovered vulnerabilities in real time; Customized Security Checks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security baseline system and method thereof for implementing security checks
  • Security baseline system and method thereof for implementing security checks
  • Security baseline system and method thereof for implementing security checks

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0087] In the first embodiment, it is assumed that the detailed information of the vulnerability includes: the basic software name (name) myname discovers the vulnerability; the affected version number (version) is m.n1, m.n2, m.n3; the cause of the vulnerability is its file (file) a The value (val) of the field (key) b is c; the standard value (std) of the field b is d; the vulnerability CVE ID is 1234; the vulnerability description (info) is xyz; the vulnerability discovery time (time) is YY-MM- DD.

[0088] The vulnerability information received by the linkage processing unit is:

[0089] {name: myname, version: m.n1|m.n2|m.n3, file: a, key: b, val: c, std: d, CVE_ID: 1234, time: YY-MM-DD, info: xyz };

[0090] The linkage processing unit combines three sets of index values ​​(myname, m.n1), (myname, m.n2), (myname, m.n3) according to the name and version fields, and queries in the asset information base based on these conditions Identify the devices that may be affected,...

no. 2 example

[0095] In the second embodiment, it is assumed that the vulnerability summary information includes: a discovered vulnerability (name), which is represented by a dangerous process p1, and the vulnerability CVE ID is 1234; the vulnerability description (info) is xyz; the vulnerability discovery time (time) is YY-MM- DD.

[0096] The vulnerability information received by the linkage processing unit is: {name:p1, version:null, file:null, key:null, val:null, std:null, CVE_ID:1234, time:YY-MM-DD, info:xyz };

[0097] The linkage processing unit combines the index value (p1, null) according to the name and version fields, and uses this as a condition to query the potentially affected equipment in the asset information database, and the result is empty (null).

[0098] The linkage processing unit assembles the vulnerability information, the target device, and the baseline template identifier (assumed to be tempalte:T1 in the second embodiment) to generate inspection information as: {n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a security baseline system and a method thereof for implementing security checks. Included are that a vulnerability information acquisition unit obtains vulnerability information actively; a linkage processing unit determines a target device based on the obtained vulnerability information, and generates checking information; and a security check unit conducts security checks for the target device based on the generated checking information. According to the application, through the active approach, the security baseline system and the method thereof for implementing the security checks obtain newly discovered vulnerability information positively in an active manner, adapt to the internet field full of such changes, and therefore achieve real-time response to newly discovered vulnerability. Further, by following the customized request of a user, the security baseline system and the method thereof for implementing the security checks establish a user security baseline library, allow the user to customize security rules to conduct security checks for the system, and thus meet the demand that the security checks can be customized.

Description

technical field [0001] The application relates to network security technology, especially to a security baseline system and a method for implementing security inspection. Background technique [0002] With the deepening influence of the Internet on society, the losses caused to people after security incidents are also becoming more and more serious. Security operation and maintenance personnel and managers increasingly hope to block security incidents before they occur by formulating security specifications and conducting security checks on devices on the entire network. The security baseline is a product that has security specifications and checks the compliance of all network devices. Among them, the security baseline refers to the minimum security guarantee of an information system, that is, the most basic security requirements that the information system needs to meet. In the engineering field, the security baseline refers to security products that ensure that the infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 郭锐
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products