Distributed asset identification and change awareness method and system for implementing vulnerability management

A perception system and distributed technology, applied in the field of network asset information security, can solve problems that affect the normal acquisition and supply of power information, multiple known loopholes and configurations, and unmanned maintenance, so as to improve the grasp of the situation and rapid processing capabilities, Achieve rapid governance and improve processing capabilities

Inactive Publication Date: 2018-11-06
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Over time, a large number of unowned assets and zombie assets have been generated. These assets have not been maintained for a long time, resulting in more known vulnerabilities and configuration violations.
What's more serious is that these assets are difficult to be included in the daily maintenance scope of administrators, which brings great hidden dangers to enterprise security and becomes the weakness of enterprise information security...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed asset identification and change awareness method and system for implementing vulnerability management
  • Distributed asset identification and change awareness method and system for implementing vulnerability management
  • Distributed asset identification and change awareness method and system for implementing vulnerability management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0035] refer to Figure 1 to Figure 3 , in one embodiment, a distributed asset identification and change awareness system for implementing vulnerability governance, comprising a plurality of network asset information collection subsystems distributed in different regions and connecting the plurality of network asset information The distributed task scheduling and data processing subsystem of the collection subsystem is based on a distributed architecture. The task scheduling part of the distributed task scheduling and data processing subsystem decomposes tasks, and assigns the decomposed tasks to appropriate Among the resources, task distribution and processing are implemented for multiple nodes, distributed execution of tasks is realized, asset inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A distributed asset identification and change awareness system for implementing vulnerability management includes a plurality of network asset information collection subsystems distributed in different regions and a distributed task scheduling and data processing subsystem, wherein tasks are decomposed based on a distributed architecture and allocated to appropriate resources through the task scheduling, task distribution and processing are realized for a plurality of nodes, and asset information detection and sensing are distributedly performed; the network asset information collection subsystems collect asset information of the networked active host; the data processing part of the distributed task scheduling and data processing subsystem obtains the asset information of the networked active host from the network asset information collection subsystems, and compares the asset information with the confirmed asset attribute information stored in the asset library to realize the automatic update of the asset information for the networked surviving host in the asset library. Vulnerability information is collected though vulnerability scanning, which may quickly treat and fix securityvulnerabilities in networked information systems.

Description

technical field [0001] The invention relates to network asset information security, in particular to a distributed asset identification and change perception method and system for realizing loophole management. Background technique [0002] Information system cyberspace is composed of numerous nodes, each node is an IT asset (or information asset) connected to the network, and information assets include host operating systems, network devices, security devices, databases, middleware, and application components. Information assets are the most basic and important carrier in information security management. With the continuous growth of the internal business of the enterprise and the rapid development of business informatization, various business support platforms and management systems are becoming more and more complex. As the resources become richer and richer, the asset management work brought to administrators becomes more and more difficult. Over time, a large number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 沈伍强吴勤勤龙震岳刘晔王甜温柏坚魏理豪卢建刚周安黄敬志林丹生邓大为吉威炎麦浩镔罗成威王文佳杨少滨裴兰
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products