A method and device for network asset risk portrait

A technology of network assets and portraits, applied in transmission systems, electrical components, etc., can solve the problems of lack of flexibility, initiative, low security protection efficiency, data and user information leakage in network security protection, and improve the efficiency of network security protection. Effect

Active Publication Date: 2021-02-12
小安(北京)科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, network security protection adopts a passive single-point defense method, that is, after a network attack situation occurs, vulnerability remediation is carried out. Since network attacks can be completed within minutes, the industry finds that the average detection time of attacks (MTTD, Mean Time To Detection) reached 84 days, and it was found that the average response time (MTTR, Mean Time To Repair) after a network attack also reached 7 days, which often led to a large amount of data and user information leakage, and network security protection lacked flexibility, initiative, and security. Low protection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for network asset risk portrait
  • A method and device for network asset risk portrait

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a network asset risk portraying method and a network asset risk portraying device, capable of improving network security protection efficiency. The network asset risk portraying method comprises: obtaining a target root domain name corresponding to the network asset to be portrayed; obtaining a sub-domain name included in the target root domain name; performing vulnerability scanning on the obtained sub-domain name to obtain vulnerabilities existing in the obtained sub-domain name; classifying the risk points of the obtained vulnerabilities according to the pre-set risk point classification strategy, and performing risk portrait on the network assets to be portrayed according to the classified risk points.

Description

technical field [0001] The present application relates to the technical field of network asset security, and in particular, to a method and device for network asset risk profiling. Background technique [0002] Network security protection is one of the main technical means to protect the network of each institution or enterprise from hacker attacks, especially the massive data interactive application network that applies new technologies such as the Internet of Things, cloud computing, and big data, and data and user information leakage, etc. Network security issues are becoming more and more prominent. Once the application network is attacked, it will cause immeasurable losses. [0003] At present, network security protection adopts a passive single-point defense method, that is, after a network attack situation occurs, vulnerability remediation is carried out. Since network attacks can be completed within minutes, the industry finds that the average detection time of attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1441
Inventor 白亚菁
Owner 小安(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products