Software vulnerability discovery method and system

A software vulnerability and discovery method technology, applied in the field of network security, can solve the problems of easy omission of manual processing, large workload of software vulnerability identification, hidden dangers of enterprise network security, etc., to save workload, speed up processing, and avoid harm. Effect

Active Publication Date: 2017-03-15
SHANGHAI CTRIP COMMERCE CO LTD
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a method and system for discovering software loopholes in order to overcome the defects in the prior art that the software loophole identification workload in the enterprise internal network is heavy, and manual processing is easy to neglect and cause potential safety hazards to the enterprise network security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability discovery method and system
  • Software vulnerability discovery method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] like figure 1 As shown, a method for discovering software vulnerabilities includes the following steps:

[0026] 101. Preset vulnerability information database. The vulnerability information database is used to store vulnerability information records. Each vulnerability information record includes the name of the vulnerability, the name and software version of the software affected by the vulnerability, and whether it is a new vulnerability. The vulnerability information is executed once a day. Crawling bots to update the vulnerability repository.

[0027] 102. Regularly query whether there are new vulnerabilities in the vulnerability information database, and if so, perform step 103;

[0028] 103. Obtain vulnerability-related software information in the vulnerability information base according to the new vulnerability, where the vulnerability-related software information includes the name and software version of the software affected by the new vulnerability.

[0029...

Embodiment 2

[0037] like figure 2 As shown, a software vulnerability discovery system includes a vulnerability information database processing module 1, a new vulnerability query module 2, a new vulnerability software acquisition module 3, a software version database query module 4, a patch information database processing module 5 and an upgrade judgment module 6 .

[0038] Wherein, the vulnerability information database processing module 1 is used to preset the vulnerability information database, and the vulnerability information database is used to store vulnerability information records, and each vulnerability information record includes the name of the vulnerability, the name and software version of the software affected by the vulnerability, and whether it is New vulnerability. The vulnerability information database processing module 1 updates the vulnerability information database once a day.

[0039] The new vulnerability query module 2 is used to periodically query whether there...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software vulnerability discovery method and system. The discovery method comprises the steps that 1, whether a new vulnerability exists or not is inquired regularly, and if yes, the step 2 is conducted; 2, vulnerability-related software information is acquired according to the new vulnerability, wherein the vulnerability-related software information comprises a name and a version of software affected by the new vulnerability; 3, whether software affected by the new vulnerability exists or not is inquired in a preset software version library according to the vulnerability-related software information, and if yes, to-be-analyzed host software information is output. According to the software vulnerability discovery method and system, vulnerability discovery can be automatically conducted, which software on a host in a to-be-analyzed network has the vulnerability and needs patch updating can be quickly, accurately and automatically identified, operation and maintenance engineers are free from heavy and complex work, and meanwhile harm caused by manual careless omissions to network security is avoided.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for discovering software loopholes. Background technique [0002] With the continuous development of Internet technology, network security incidents using vulnerability attacks continue to occur and are becoming more and more serious. In recent years, there are more and more system loopholes, and the speed of exploiting loopholes is getting faster and faster. The network attack technology and attack tools are changing with each passing day, and the network security situation is very severe. Although various security patches and upgrade programs can be released in time to prevent possible damage caused by vulnerabilities. However, due to the large number of software assets in the enterprise, it becomes very difficult and complicated to rely solely on operation and maintenance personnel to manually identify the hosts and their software versions that ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
Inventor 吴善鹏朱志博雷兵张浩峥
Owner SHANGHAI CTRIP COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products