Web vulnerability discovery method and system

A vulnerability mining and vulnerability technology, which is applied in the field of network security, can solve problems such as tampering with webpage content and infringement of website visitors, and achieve the effect of improving accuracy and efficiency

Active Publication Date: 2014-11-12
ALIBABA GRP HLDG LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers use the loopholes of the website to obtain the control authority of the web server, tamper with the content of the webpage, and even

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability discovery method and system
  • Web vulnerability discovery method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0057]In a typical configuration of the present application, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0058] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0059] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Web vulnerability discovery method and system. The web vulnerability discovery method includes the steps that Web access logs are collected and stored, discovery tasks are allocated according to a preset log analyzing and discovery strategy, the Web access logs are inquired according to the allocated discovery tasks, and Web vulnerability scanning is performed according to an inquiry result to determine vulnerability. According to the scheme, the capacity for storing, analyzing and inquiring mass data of the Hadoop framework and other big data analysis framework and the accuracy of Web vulnerability scanning are used for forming the close-loop vulnerability discovery method, and needle-in-the-haystack inquiries are avoided due to the targeted and objective inquiry, so that the inquiry efficiency is greatly improved, and accuracy of Web vulnerability discovery is ensured due to the accuracy of the Web vulnerability scanning technology. According to the Web vulnerability discovery method and system, the Web vulnerability are accurately analyzed and inquired under the mass data, so that accuracy and timeliness of Web vulnerability discovery are improved.

Description

technical field [0001] This application relates to network security technology, especially a method and system for mining web vulnerabilities based on a big data environment. Background technique [0002] With the birth of a series of new Internet products such as Web2.0, social network, and microblog, Internet applications based on the Web environment are becoming more and more extensive. At present, many businesses rely on the Internet, such as online banking, online shopping, online games, etc., followed by the emergence of Web security threats. Hackers use the loopholes of the website to obtain the control authority of the web server, tamper with the content of the webpage, and even steal important internal data. What is more serious is to implant malicious codes in the webpage, causing the website visitors to be infringed. And many malicious attackers try to obtain other people's personal account information through various means to seek benefits. Among them, the vuln...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30
Inventor 段文国
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products