Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for searching application vulnerabilities, and system

A vulnerability and network intrusion detection technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as poor efficiency, and achieve the effect of improving mining efficiency

Active Publication Date: 2017-12-22
ADVANCED NEW TECH CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the commonly used method is to determine the attack surface and find application vulnerabilities through manual auditing, which is inefficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for searching application vulnerabilities, and system
  • Method and device for searching application vulnerabilities, and system
  • Method and device for searching application vulnerabilities, and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present application provide a method, device, and system for finding application vulnerabilities.

[0033] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0034] In order to facilitate understanding of the embodiments of the present application, several elements that will be introduced in the description of the embodiments of the present application are firstly intro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a device for searching application vulnerabilities, and a system. The method comprises the following steps that: according to the static program detection information and the operation environment detection information of an application, determining the attack surface of the application; obtaining monitoring data corresponding to the attack surface when the application is operated; and according to the monitoring data corresponding to the attack surface and a network intrusion detection rule corresponding to the attack surface, determining the attack surface which may have vulnerabilities in the attack surface of the application, wherein the network intrusion detection rule of the attack surface is configured by aiming at the attack surface and is used for detecting network intrusion.

Description

technical field [0001] The present application relates to the technical field of computer software, in particular to a method, device and system for finding application loopholes. Background technique [0002] Application vulnerabilities refer to defects that can weaken application security; application attack surfaces refer to points in the application environment that can be attacked by unauthorized users (attackers) to input or extract data. [0003] In the process of application vulnerability mining, the attack surface describes the location of possible security holes in the code that have yet to be discovered. For example, in browser-based attacks, the http protocol, html pages, loading plug-ins, etc. all constitute the attack surface of the browser. Finding a suitable application attack surface plays an important role in mining application vulnerabilities. [0004] At present, the commonly used method is to determine the attack surface and find application vulnerabil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 王加水
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products