System bug attack detection method and apparatus
The technology of a detection method and a detection device, which is applied in the field of vulnerability detection, can solve the problems of low detection accuracy of privilege escalation vulnerability attacks, achieve accurate detection of system vulnerability attack events, and solve the effects of low detection accuracy and accurate detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] According to an embodiment of the present invention, an embodiment of a method for detecting a system vulnerability attack is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0023] According to an embodiment of the present invention, a method for detecting a system vulnerability attack is provided, such as figure 1 As shown, the detection method can be realized through the following steps:
[0024] Step S102: Obtain the operation information of the operations currently performed in the system by accounts with non-system highest authority.
[0025] Step S104: Determine whether the operation indicated by the operation information is to modify the authority of ...
Embodiment 2
[0098] According to the embodiment of the present invention, there is also provided a detection device for implementing the system vulnerability attack of the above embodiment, which can be realized by the testing method involved in the embodiment, and the implementation process of the present application will be described in detail below.
[0099] Figure 5 is a schematic diagram of a system vulnerability attack detection device according to an embodiment of the present invention. Such as Figure 5 As shown, the detection device may include: a first acquiring module 21 , a first judging module 23 and a first determining module 25 .
[0100] Wherein, the first obtaining module is used to obtain the operation information of the operation currently performed by the account with non-system highest authority in the system.
[0101] The first judging module is used for judging whether the operation indicated by the operation information is to modify the authority of the account f...
Embodiment 3
[0129] The embodiment of the present invention also provides a terminal. Optionally, in this embodiment, the above-mentioned terminal may execute the method for detecting a system vulnerability attack, and the device for detecting a system vulnerability attack in the above-mentioned embodiment may be set on the terminal.
[0130] Figure 7 is a structural block diagram of a terminal according to an embodiment of the present invention. Such as Figure 7 As shown, the terminal 30 may include: one or more (only one is shown in the figure) processors 31 , a memory 33 , and a transmission device 35 .
[0131] Wherein, the memory 33 can be used to store software programs and modules, such as the program instructions / modules corresponding to the security hole detection method and device in the embodiment of the present invention, and the processor 31 runs the software programs and modules stored in the memory 33 to execute Various functional applications and data processing, that ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com