Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automatic vulnerability validation method

A verification method and vulnerability technology, applied in the field of information security, can solve problems such as the inability to perform verification loophole utilization, the vulnerability scanning system cannot provide evidence of the existence of loopholes, etc., to improve efficiency and automation, realize data exchange and utilization, and improve automation. degree of effect

Inactive Publication Date: 2015-02-18
XIAN UNIV OF POSTS & TELECOMM +1
View PDF7 Cites 102 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention proposes a method for automatic vulnerability verification, which realizes the automatic verification of network security vulnerabilities, and solves the problem that the existing vulnerability scanning system cannot provide evidence of the existence of vulnerabilities and cannot perform verification vulnerability utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic vulnerability validation method
  • Automatic vulnerability validation method
  • Automatic vulnerability validation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention; All other embodiments belong to the protection scope of the present invention.

[0045] see figure 1 , is a schematic diagram of an automated vulnerability verification method provided by the present invention, and the specific implementation method is as follows.

[0046] S100: Collect information on the target. If the target is a host system, use active detection to identify the target operating system according to the operating system fingerprint, obtain the machine name of the target machine, and obtain the network topology; then perform port scanning, using TCP port scanning There are two modes of scanning and UDP port scanning; if the target is a web system, it will detect basic information such as the type of the target web server, service version number, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an automatic vulnerability validation method. The method comprises the steps that firstly, validation information is collected, wherein an active detection way is adopted for carrying out information detection, topological detection, vulnerability detection and website directory structure detection on a target; secondly, the validation information is packaged, wherein suspicious vulnerability key information in vulnerability detection results is extracted, uniform-interface modularized packaging is carried out on the data; thirdly, a validation strategy is searched for, wherein according to the suspicious vulnerability identity and variety information, an appropriate attack script template and a vulnerability utilizing tool are selected; vulnerability validation is carried out, wherein scripts are called to be loaded into the packaged vulnerability information to carry out validation attack, and an utilization voucher is obtained and stored; fifthly, validation traces are removed, wherein validation attack traces are removed, sessions are recycled; finally, a scanning report is generated. The automatic vulnerability validation method solves the problem that an existing vulnerability scanning system is high in false alarm rate and cannot carry out effective validation, is automatic and procedural, can automatically recognize and validate vulnerabilities, lowers the requirement for the ability of non-professional staff and improves the vulnerability validation efficiency.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for automatic vulnerability verification. Background technique [0002] Thousands of network security vulnerabilities are discovered and published every year, coupled with the constant changes and updates of attackers’ methods, the network security situation is also becoming increasingly severe with the increase of security vulnerabilities; it has been proved that 99% of the attacks All exploit unpatched loopholes, so that many enterprises that have deployed firewalls, intrusion detection systems, and antivirus software are still suffering from vulnerability attacks and suffering huge economic losses. [0003] Tracing back to the source, the vast majority of users lack a complete and effective workflow for vulnerability discovery and verification, and fail to implement regular assessment and vulnerability repair work; only by knowing their own network security vulnera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/1433G06F21/57
Inventor 朱志祥张勇吴晨刘盛辉
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products