Network asset information acquisition system

A technology for information collection and network assets, applied in the field of network information security, it can solve problems such as difficulty in timely and accurate discovery and repair of vulnerabilities and incomplete grasp of information asset information.

Active Publication Date: 2018-06-19
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The information of information assets is not fully grasped, and it is difficult to find and repair vulnerabilities in a timely and accurate manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset information acquisition system
  • Network asset information acquisition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0039] refer to figure 1 , in one embodiment, the network asset information collection system of the present invention includes: a basic information collection module configured to discover networked hosts and perform fingerprint identification of the host operating system to detect the operating system type of the remote target host The application component fingerprint collection module is configured to discover one or more application programs or component fingerprint information including network application programs or component versions, service ports, and protocol interaction characteristics; the vulnerability awareness module is configured to Perceive and analyze the vulnerability of network hosts and application systems to discover the vulnera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network asset information acquisition system, which comprises a basic information collection module, an application component fingerprint collection module and a vulnerability perception module, wherein the basic information collection module is configured to discover a networking host to carry out fingerprint identification of a host operating system in order to detect an operation system type of a remote target host; the application component fingerprint collection module is configured to discover one or more pieces of application program or component fingerprint information in a version of a network application program or component, a service port and a protocol interaction feature; and the vulnerability perception module is configured to carry out perceptual analysis on the vulnerability of a network host and an application system in order to discover the vulnerabilities of the operating system, the service and the application component. According to the network asset information acquisition system, the security vulnerability of the information system can be accurately and reliably discovered, and an advantageous condition is provided for timely repairing the security vulnerability of the information system.

Description

technical field [0001] The invention relates to network information security, in particular to a system for collecting network asset information. Background technique [0002] With the rapid development of the Internet, the security loopholes of various network assets and information systems are major hidden dangers of information security. Security vulnerabilities are certain types of problems that arise in various stages of an information system's life cycle (design, implementation, operation and maintenance, etc.), and these problems will affect the security (confidentiality, integrity, availability) of the system. Due to software defects, misconfiguration of applications and IT equipment, and general errors, etc., new vulnerabilities appear every day. At present, the vulnerability scanning system is generally used to conduct regular vulnerability scanning or regular security checks to find security vulnerabilities and then repair and strengthen them. work, there are the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0861H04L63/1416H04L63/1425H04L63/1433H04L67/025H04L69/16
Inventor 吴勤勤邹洪沈伍强温柏坚卢建刚徐晖王甜魏理豪刘晔黄敬志梁智强沈桂泉刘超颖陈志华张润妹
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products