Vulnerability discovery method and device

A vulnerability discovery and vulnerability technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problem of not being able to discover multiple input element vulnerabilities

Active Publication Date: 2016-10-05
CHINA INFORMATION TECH SECURITY EVALUATION CENT +1
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method and device for discovering vulnerabilities, which solves the problem that the current testing scheme cannot discover the vulnerabilities introduced by multiple input elements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability discovery method and device
  • Vulnerability discovery method and device
  • Vulnerability discovery method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0054] First, Embodiment 1 of the present invention will be described with reference to the accompanying drawings.

[0055] The embodiment of the present invention provides a vulnerability discovery method, using this method to complete the vulnerability discovery process as follows figure 1 shown, including:

[0056] Step 101, calculating the weight of the malformed data causing the loophole;

[0057] In this step, a learning neural network for malformed data is constructed to form a background analysis platform.

[0058] There are a lot of data that often cause loopholes, such as "0", ",", "%^#$", etc. When performing multi-dimensional fuzz testing, fuzz testing is performe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for discovering loopholes. It involves the field of work control network security; it solves the problem that the current test scheme cannot discover the loopholes jointly introduced by multiple input elements. The method includes: calculating the weight of the malformed data that causes the loophole; constructing a multi-dimensional test case; running the multi-dimensional test case, and testing with the malformed data as input; The weight is set to the maximum. The technical solution provided by the invention is applicable to the FUZZ technology, and realizes the discovery of multi-dimensional loopholes.

Description

technical field [0001] The invention relates to the field of industrial control network security, in particular to a vulnerability discovery method and device. Background technique [0002] The industrial control system based on computer technology and industrial-grade network has gone through more than ten years. The industrial control system has also developed from the previous special equipment and the network system separated and independent from the outside world into an enterprise management layer, data collection information layer , The industrial control system of the industrial control layer. This integrates many standard protocols commercially available in the IT field, such as Microsoft Windows operating system and Ethernet TCP / IP technology and so on. This greatly saves costs and improves work efficiency, but brings a lot of security risks, such as platform vulnerabilities and network vulnerabilities. As a result, the industrial control system faces DOS attacks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 谢丰肖小剑彭勇蒋发群赵伟孙薇
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products