Asset management system based on network asset information collection

An asset management system and information collection technology, applied in the field of network information security, can solve the problems of incomplete grasp of information asset information, difficulty in timely and accurate discovery of loopholes and repairs, etc.

Inactive Publication Date: 2018-05-08
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF13 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The information of information assets is not fully grasped, and it...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset management system based on network asset information collection
  • Asset management system based on network asset information collection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0044] refer to figure 1 , in one embodiment, an asset management system based on network asset information collection includes a network asset information collection system, and the network asset information collection system includes: a basic information collection module configured to discover networked hosts and perform host Fingerprint identification of the operating system, to detect the type of operating system of the remote target host; an application component fingerprint collection module, which is configured to discover one or more of the version, service port, and protocol interaction characteristics of the network application or component Application program or component fingerprint information; vulnerability awareness module, which is con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asset management system based on network asset information collection. The system comprises a network asset information collection system. The network asset information collection system comprises a basic information collection module which is configured to discover network hosts and carry out fingerprint identification of operating systems of hosts, thereby detecting types of the operating systems of remote target hosts; an application and assembly fingerprint collection module which is configured to discover one or more pieces of application or assembly fingerprintinformation in versions, service ports and protocol interaction characteristics of network applications or assemblies; and a vulnerability sensing module which is configured to sense and analyze vulnerability of the network hosts and the application system, thereby discovering vulnerabilities of the operating system, service, applications and assemblies. According to the asset management system based on the network asset information collection provided by the invention, security vulnerabilities of an information system can be accurately, reliably and timely repaired.

Description

technical field [0001] The invention relates to network information security, in particular to an asset management system based on network asset information collection. Background technique [0002] With the rapid development of the Internet, the security loopholes of various network assets and information systems are major hidden dangers of information security. Security vulnerabilities are certain types of problems that arise in various stages of an information system's life cycle (design, implementation, operation and maintenance, etc.), and these problems will affect the security (confidentiality, integrity, availability) of the system. Due to software defects, misconfiguration of applications and IT equipment, and general errors, etc., new vulnerabilities appear every day. At present, the vulnerability scanning system is generally used to conduct regular vulnerability scanning or regular security checks to find security vulnerabilities and then repair and strengthen the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/57G06F11/30
CPCG06F11/302G06F11/3051G06F21/577G06F2221/033G06F2221/034H04L63/1433H04L67/02H04L69/161
Inventor 邹洪沈伍强吴勤勤温柏坚刘晔魏理豪余志文周安陈敏胡海生曾纪钧梁哲恒刘超颖陈志华张润妹
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products