A method for active detection and vulnerability warning of assets

An active detection and asset technology, applied in the field of Internet security, can solve problems such as regulatory asset loopholes, and achieve the effect of improving security

Active Publication Date: 2019-07-05
EVERSEC BEIJING TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the deficiencies of the prior art, the purpose of the present invention is to provide a method for active asset detection and loophole warning, so as to solve the problem of regulatory asset loopholes existing in the original Internet risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for active detection and vulnerability warning of assets
  • A method for active detection and vulnerability warning of assets
  • A method for active detection and vulnerability warning of assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in further detail below in conjunction with the accompanying drawings, but it is not intended to limit the present invention.

[0043] A method for active asset detection and vulnerability warning proposed by the present invention mainly includes the following steps:

[0044] Step 10, issue the IP segment of the asset to be detected in the form of a task;

[0045] Step 20, storing the detected task details information in the message middleware (MQ) in the form of a message;

[0046] Among them, after the IP segment of the asset to be detected is issued in the form of a task in step 10, in step 20, the survivability of the IP is first detected to determine whether the IP is alive, and if it is alive, the subsequent step 30 is executed Operation and follow-up steps, if not survived, follow-up steps will not be performed.

[0047] Step 30, the asset detection engine receives the task details information to be detected from the mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for active detection and vulnerability early warning of assets. The method comprises: survivability of an unknown host is determined by several kinds of ways; host fingerprint information and web fingerprint information of a surviving host are detected by sensing several kinds of communication data packets; whether a detected host belongs to the asset is determined by configuring different asset rules; vulnerability base information is synchronized regularly; and vulnerability information is associated by the scanned host fingerprint information and web fingerprint information and vulnerability information early warning is carried out. According to the disclosed method, massive IPs are detected and asset information owned by the user is analyzed by combining the asset rule base information, so that the user can master the asset fingerprint information including the host fingerprint information and web fingerprint information comprehensively and obtain a potential vulnerability risk; and thus the system or used software version can be updated timely, so that the host safety coefficient is improved.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method for actively detecting assets and early warning of loopholes. Background technique [0002] In today's society, with the rapid development of science and technology, there are all kinds of devices connected to the Internet. In addition to PCs and servers, there are also routers, tablet computers, mobile phones, cameras, etc., and even sensitive SCADA systems in automobiles and industrial control. Devices, these devices are regarded as nodes, and together constitute the network space. Frequent replacement of devices also promotes the vigorous development of Internet services. Various organizations that provide Internet services emerge in endlessly, and Internet service organizations use various IT technologies Provide diversified services for various Internet equipment hardware. The huge Internet market brings huge business opportunities, but also hides huge da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 韩立山金红刘长永杨满智李东阳蒋军
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products