Network asset risk portraying method and device

A technology of network assets and portraits, applied to electrical components, transmission systems, etc., can solve the problems of lack of flexibility, initiative, data and user information leakage, and low security protection efficiency in network security protection, and improve the efficiency of network security protection Effect

Active Publication Date: 2018-11-13
小安(北京)科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, network security protection adopts a passive single-point defense method, that is, after a network attack situation occurs, vulnerability remediation is carried out. Since network attacks can be completed within minutes, the industry finds that the average detection time of attacks (MTTD, Mean Time To Detection) reached 84 days, and it was found that the average response time (MTTR, Mean Time To Repair) after a network attack also reached 7 days, which often led to a large amount of data and user information leakage, and network security protection lacked flexibility, initiative, and security. Low protection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset risk portraying method and device
  • Network asset risk portraying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Thus, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a network asset risk portraying method and a network asset risk portraying device, capable of improving network security protection efficiency. The network asset risk portraying method comprises: obtaining a target root domain name corresponding to the network asset to be portrayed; obtaining a sub-domain name included in the target root domain name; performing vulnerability scanning on the obtained sub-domain name to obtain vulnerabilities existing in the obtained sub-domain name; classifying the risk points of the obtained vulnerabilities according to the pre-set risk point classification strategy, and performing risk portrait on the network assets to be portrayed according to the classified risk points.

Description

technical field [0001] The present application relates to the technical field of network asset security, and in particular, to a network asset risk portrait method and device. Background technique [0002] Network security protection is one of the main technical means to protect the network of each institution or enterprise from being attacked by hackers, especially the massive data interactive application network that applies new technologies such as the Internet of Things, cloud computing, and big data, and data and user information leakage, etc. The problem of network security is becoming more and more prominent. Once the application network is attacked, it will lead to immeasurable losses. [0003] At present, network security protection adopts a passive single-point defense method, that is, after a network attack occurs, vulnerability remediation is carried out. Since network attacks can be completed within minutes, and the industry's average detection time (MTTD, Mean ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1441
Inventor 白亚菁
Owner 小安(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products