Website bug online evaluation method and device

A website vulnerability and vulnerability online technology, applied in the Internet field, can solve the problems that cannot effectively play a preventive role, do not take into account the business impact of vulnerability website access traffic, website damage, etc.

Active Publication Date: 2015-05-13
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, the evaluation standard of the vulnerability library is used for evaluation, but this evaluation standard does not take into account factors such as the access traffic of the vulnerable website and the b...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website bug online evaluation method and device
  • Website bug online evaluation method and device
  • Website bug online evaluation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0053] Figure 1A It shows a schematic flow chart of the website vulnerability online assessment method provided by an embodiment of the present invention, as shown in Figure 1A As shown, the website vulnerability online assessment method of this embodiment is as follows.

[0054] 101. Receive website vulnerability information sent through a vulnerability detection webpage, where the website vulnerability information includes: URLs of websites with vulnerabilities, vulnerability test parameters, and vulnerability test results.

[0055] For example, the above website vulnerability information is the vulnerability information submitted by some professional users such as white ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a website bug online evaluation method and device. the method comprises receiving website bug information sent by bug detection webpage, wherein the website bug information comprises uniform resource locators with bug websites, bug test parameters and bug test results; obtaining classification identification of the bugs and the website access flow within the preset period according to the website bug information; determining bug risk evaluation levels of the bugs according to the classification identification of the bugs and the website access traffic. By the aid of the method and the device, the bug risk evaluation levels are determined by comprehensive considering of the bug classification identification and the bug website access traffic, so that the determined risk evaluation levels are in accordance with the actual website harm degree by the bugs, pertinence is provided for subsequent bug fixing schemes, and an effective precaution effect is provided.

Description

technical field [0001] The invention relates to Internet technology, in particular to an online vulnerability assessment method and device for a website. Background technique [0002] With the application of Internet technology more and more widely, a lot of people's daily work and entertainment are carried out on the Internet, and the Internet is closely related to people's life. Therefore, the security of the website has been paid more and more attention by people. However, there are various hidden dangers in the network, such as: COOKIE poisoning, application buffer overflow, cross-site scripting attack, various security holes and so on. [0003] Vulnerability discovery is a key process in the confrontation between the attacker and the defender. If the defender cannot discover exploitable vulnerabilities earlier than the attacker, the attacker may use the vulnerability to launch an attack. The sooner vulnerabilities are found and fixed, the less likely an information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06
Inventor 计东吴辉
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products