Vulnerability scanning method and server and risk assessment system

A vulnerability scanning and server technology, which is applied in the field of information security, can solve the problems of slow matching of vulnerability characteristics and large storage space occupied by the vulnerability library, and achieve the effect of intuitive system risk assessment method, fast matching speed and reduced storage space

Inactive Publication Date: 2014-11-12
CHINA TELECOM CORP LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] A technical problem to be solved by the embodiments of the present invention is to propose a vulnerability scanning method, server, and risk assessment system to solve the problems that the vulnerability library occupies a large storage space and the vulnerability feature matching speed is slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and server and risk assessment system
  • Vulnerability scanning method and server and risk assessment system
  • Vulnerability scanning method and server and risk assessment system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] In order to solve the problem that the vulnerability database occupies a large storage space, the present invention compresses the vulnerability features through the bloom filter algorithm, and can compress the known vulnerability features into an m-bit array, thereby reducing the storage space...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability scanning method and server and a risk assessment system and relates to the technical field of information security. The method comprises the steps that the server receives a scanning parameter configuration file from a client side and scans a scanned target according to the scanning parameter configuration file; the server extracts keywords from a scanning result; based on a bloom filter algorithm, the server performs quick matching on the extracted keywords and vulnerability features, compressed based on the bloom filter algorithm, in a vulnerability library, and the server determines whether vulnerability exists in the scanning result according to a matching result. As the vulnerability features are compressed based on the bloom filter algorithm, the know vulnerability features can be compressed into an m-bit array, and then storage space is reduced. In addition, a Hash operation is performed on the scanned keywords based on the bloom filter algorithm, matching is performed on Hash operation results and the m-bit array of the known vulnerability features, in this way, it can be determined whether the vulnerability exists in the scanning result, and the matching speed is higher.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a vulnerability scanning method, a server, and a risk assessment system. Background technique [0002] On the modern information highway, the computer network has become a bridge for people to learn and communicate with the world. People share information resources through the network, which not only expands space and time, but also improves work or study efficiency. However, with the continuous expansion of the network scale, the number of network security incidents and the losses caused by them are also increasing. Especially viruses, hackers and other cyber crimes pose a great threat to computer network security. Therefore, while we are benefiting from the various benefits brought by computer networks, we must also face the severe test of network security. [0003] In response to this situation, the industry proposes that vulnerability scanning technology can b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/1433
Inventor 张继平董晓庄孙小红张强李洪渠凯姚良杜民王燕川周文红伍思源周蔚峰李青
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products