Supercharge Your Innovation With Domain-Expert AI Agents!

Vulnerability type identification method and device

A type identification and vulnerability technology, applied in the field of information security, can solve problems such as the inability to quickly select repair methods, computer system security cannot be guaranteed, and the type of vulnerability cannot be accurately detected, so as to achieve the effect of protecting security

Active Publication Date: 2018-01-02
三六零数字安全科技集团有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the currently set vulnerability detection rules are relatively broad rules, one rule can identify dozens or even hundreds of vulnerability types, and cannot accurately detect the types of vulnerabilities in malicious samples, so that it is impossible to quickly select the corresponding repair method , the security of the computer system cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability type identification method and device
  • Vulnerability type identification method and device
  • Vulnerability type identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0026] An embodiment of the present invention provides a method for identifying a vulnerability type, such as figure 1 As shown, the method includes:

[0027] 101. Obtain the type of the file to be detected.

[0028] There are often multiple vulnerabilities in one type of file, but one type of vulnerability often only exists in one type of file. When identifying and storing discovered vulnerabilities, the file type and the vulnera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a loophole type recognition method and device, and relates to field of information safety. The loophole type recognition method and device mainly aim at accurately detecting types of loopholes in malware samples, so that a corresponding repair mode is rapidly selected, and the safety of a computer system is protected. According to the main technical scheme, the method comprises the steps of obtaining the type of a file to be detected; according to the type of the file to be detected, inquiring a loophole basic database to obtain loophole detection logic corresponding to the file of the type, wherein the loophole basic database is a known loophole database, each piece of loophole information in the database comprises the file type of the file with a loophole, a loophole serial number and the loophole detection logic, and the loophole serial number and the loophole detection logic are unique and correspond to each other; detecting the file to be detected according to the obtained loophole detection logic; if the loophole is detected, determining the loophole serial number according to the loophole detection logic to obtain the unique loophole. The loophole type recognition method and device are mainly applied to the loophole type recognition process.

Description

technical field [0001] The invention relates to the field of information security, in particular to a vulnerability type identification method and device. Background technique [0002] With the continuous development of computer technology, the degree of informatization of human society is getting higher and higher, and the whole society is more and more dependent on computer information. At the same time, the loopholes of computer programs are constantly increasing, and the security risks have reached unprecedented heights. Once the loopholes are discovered, attackers can use these loopholes to obtain additional permissions of the computer system, enabling the attacker to access or destroy the system without authorization, thus endangering the security of the computer system. [0003] In order to be able to identify the types of vulnerabilities in time so as to perform timely repairs, various solutions have been devised. The currently commonly used technical solution is: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/56G06F21/57
Inventor 唐海陈卓邢超杨康
Owner 三六零数字安全科技集团有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More