Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for building vulnerability verification environment

A technology for verifying environment and vulnerabilities, applied in the field of information security, can solve the problems of high testers' ability requirements and labor-intensive problems, and achieve the effect of improving construction efficiency, reducing labor consumption, and reducing ability requirements.

Active Publication Date: 2019-06-18
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this process of building a vulnerability verification environment requires high testers' ability and is labor-intensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for building vulnerability verification environment
  • Method and device for building vulnerability verification environment
  • Method and device for building vulnerability verification environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0018] For example, see figure 1 , is a schematic flowchart of a method for building a vulnerability verification environment provided by an embodiment of the present invention. Such as figure 1 As shown, the method may include:

[0019] S110. Provide an element library, so that the user can select a required element from the element library, wherein the element library includes elements of the file used for vulnerability verification.

[0020] It should be noted that the element database described in the embodiment of the present invention can be constructed by using any database language or database software, which is not limited in the present invention. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for building a vulnerability verification environment. For example, the method can comprise the steps of providing an element database, so that users can select the required elements from the element database, wherein the element database comprises elements corresponding to files used for vulnerability verification; and when the users finish the selection of the elements, using a system image file customization technology to package the files corresponding to the selected elements, and obtaining a vulnerability verification template used for generating a virtual machine. According to the method and the device for building the vulnerability verification environment provided by the invention, a tester can quickly select the elements corresponding to the files used for the vulnerability verification from the element database without manually installing relevant tools, thereby reducing the consumption of manpower, and improving the building efficiency of the vulnerability verification environment.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for building a vulnerability verification environment. Background technique [0002] In recent years, the number of computer network vulnerabilities has increased sharply, and hacker attacks have occurred frequently. Network security has become an important issue that people pay more and more attention to. Therefore, rapid verification of vulnerabilities is crucial to vulnerability defense. [0003] To conduct vulnerability verification, the vulnerability verification environment must first be set up. The establishment of a traditional vulnerability verification environment requires testers to be familiar with information security knowledge in order to understand which tools are needed for vulnerability verification, and then manually collect the required tools, install and configure the collected tools, and complete the establishment of the vulner...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 郭承青许俊峰何跃鹰袁春阳张文宫真真李欣李轶夫王进摆亮李晗徐剑赵忠华袁钟怡
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT