Unlock instant, AI-driven research and patent intelligence for your innovation.

Content-based vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the Internet field, can solve problems such as high time and resource overhead

Active Publication Date: 2018-11-06
BEIJING QIHOO TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention proposes a content-based vulnerability detection method and device, the main purpose of which is to solve the problem of large time and resource overhead in the vulnerability detection method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content-based vulnerability detection method and device
  • Content-based vulnerability detection method and device
  • Content-based vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0022] In the existing vulnerability detection method, it is necessary to use the vulnerability detection module to analyze the injection point, simulate the attack behavior, and obtain the attack result. There are many records, so the time spent on reading and writing persistent data is very high; and when there are N vulnerability samples in the database, the program needs to compare the attack results with N vulnerability samples...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a content-based vulnerability detection method and device, and relates to the technical field of the internet, which solves the problem in the prior art that the time and resource overhead is too large according to existing vulnerability detection methods. The method comprises the steps of analyzing the script rule of a suspicious request sent to a to-be-detected target; acquiring data returned by the to-be-detected target; judging whether the data conform to the returned result of the script rule of the suspicious request or not; if yes, determining the to-be-detected target to have a vulnerability. According to the invention, the vulnerability type is preliminarily determined mainly based on the request rule and the response content. In this way, the effects of shortening the vulnerability detection period and reducing the resource overhead are realized.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a content-based vulnerability detection method and device. Background technique [0002] Due to the existence of a large number of loopholes in the existing network environment, in order to prevent data loss or tampering, privacy leakage, and even monetary losses caused by malicious use of the loopholes, such as the website being invaded due to loopholes, website user data being leaked, and the website Functions may be damaged and suspended or even the server itself is controlled by intruders, and as time goes by, old vulnerabilities will continue to disappear, new vulnerabilities will continue to appear, and the vulnerability problem will also exist for a long time. Therefore, in actual situations, irregular detection of vulnerabilities is usually required. [0003] In the existing vulnerability detection method, it is necessary to use the vulnerability detection module to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 闫培健
Owner BEIJING QIHOO TECH CO LTD