Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for mining web vulnerabilities

A vulnerability mining and vulnerability technology, applied in the field of network security, can solve problems such as website visitor infringement and tampering with webpage content, and achieve the effect of improving efficiency and accuracy

Active Publication Date: 2018-05-08
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers use the loopholes of the website to obtain the control authority of the web server, tamper with the content of the webpage, and even steal important internal data. What is more serious is to implant malicious codes in the webpage, so that the website visitors are infringed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for mining web vulnerabilities
  • Method and system for mining web vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0057] In a typical configuration of the present application, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0058] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0059] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method and system for mining web vulnerabilities, including collecting and storing web access logs, assigning mining tasks according to preset log analysis and mining strategies, querying web access logs according to the assigned mining tasks, and finally performing Web vulnerability scans to identify vulnerabilities. In this application scheme, a closed-loop vulnerability mining method is formed by using the massive data storage, analysis and query capabilities of Hadoop and other big data analysis frameworks, as well as the accuracy of Web vulnerability scanning. Through targeted and targeted queries, The query of finding a needle in a haystack is avoided, thereby greatly improving the efficiency of the query, and the accuracy of the Web vulnerability scanning technology also ensures the accuracy of the Web vulnerability mining of this application. Therefore, the Web vulnerability mining method and system provided by the present application can accurately realize the analysis and query of Web vulnerabilities under massive data, thereby improving the accuracy and timeliness of Web vulnerability mining.

Description

technical field [0001] This application relates to network security technology, especially a method and system for mining web vulnerabilities based on a big data environment. Background technique [0002] With the birth of a series of new Internet products such as Web2.0, social network, and microblog, Internet applications based on the Web environment are becoming more and more extensive. At present, many businesses rely on the Internet, such as online banking, online shopping, online games, etc., followed by the emergence of Web security threats. Hackers use the loopholes of the website to obtain the control authority of the web server, tamper with the content of the webpage, and even steal important internal data. What is more serious is to implant malicious codes in the webpage, causing the website visitors to be infringed. And many malicious attackers try to obtain other people's personal account information through various means to seek benefits. Among them, the vuln...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F17/30
Inventor 段文国
Owner ALIBABA GRP HLDG LTD