Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security configuration vulnerability monitoring method, device, and computer-readable storage medium

A security configuration and vulnerability technology, applied in the security field, can solve the problems of intranet attacks, affecting the normal operation of the system, time-consuming and laborious, etc., and achieve the effect of preventing attacks.

Active Publication Date: 2020-12-22
SANGFOR TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 6. Subsequent intranet attacks
The current status quo is that the network structure is becoming more and more complex, and the number and types of important applications and servers are increasing. Once personnel misuse or ignore a certain configuration detail of a certain system, it may greatly affect the normal operation of the system. run
By adopting a unified security configuration standard to standardize the daily operations of technicians on various systems, the operation and maintenance personnel have a benchmark for checking default risks. Completing compliance system configuration checks and repairs has become a time-consuming and labor-intensive task

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration vulnerability monitoring method, device, and computer-readable storage medium
  • Security configuration vulnerability monitoring method, device, and computer-readable storage medium
  • Security configuration vulnerability monitoring method, device, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0054] Please refer to Figure 1~2, figure 1 It is a method flowchart of the security configuration vulnerability monitoring method 100 in the first embodiment of the present invention, figure 2 for use figure 1 A schematic diagram of the module architecture of the security configuration vulnerability monitoring system 200 of the security configuration vulnerability monitoring method 100 .

[0055] The security configuration vulnerability monitoring system 200 is configured in an Internet system and can be implemented in various forms. Fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security configuration vulnerability monitoring method. The method includes the following steps: through fingerprint detection, collecting information of network channels ornetwork nodes that accord with preset fingerprint conditions; arranging self-adaptive probes that fit the network channels or the network nodes; obtaining configuration file information of the networkchannels or the network nodes through the self-adaptive probes; and comparing the configuration file information of the network channels or the network nodes with security baseline indexes corresponding to the network channels or the network nodes, and obtaining security configuration vulnerability information of the network channels or the network nodes. The security configuration vulnerabilitymonitoring method can comprehensively detect security configuration vulnerability information of network channels or network nodes in an Internet system to prevent attacks of hackers at the source. The invention also provides a security configuration vulnerability monitoring device configured in the Internet and a computer readable storage medium.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a security configuration loophole monitoring method, a security configuration loophole monitoring device and a computer-readable storage medium. Background technique [0002] The process of advanced persistent threat attacks by hackers mainly includes: [0003] 1. Collect information on the attack target (collect various configuration information). [0004] 2. The attacker analyzes the collected configuration information and begins to write attack tools. [0005] 3. Start delivery for the target. [0006] 4. The delivery is successful and the attack begins. [0007] 5. Upload the computer shell (shell) for remote control. [0008] 6. Subsequent intranet attacks. [0009] Hackers usually use security configuration vulnerability information on terminals or servers as an entry point to organize attacks. In the attack process of advanced persistent threats, the collect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L29/08
Inventor 郑天时
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products