Method and system for quickly sensing, locating and verifying vulnerability

A vulnerability and fast technology, applied in the field of information asset security, can solve the problems of general crawler technology search scale, update speed and personalization can not meet the needs of users, and achieve the effect of reasonable structure

Inactive Publication Date: 2018-12-11
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the explosive expansion of network resources and the rapid growth of information volume, the general crawler technology can no longer meet the needs of users in many aspects such as search scale, update speed and personalization.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for quickly sensing, locating and verifying vulnerability
  • Method and system for quickly sensing, locating and verifying vulnerability
  • Method and system for quickly sensing, locating and verifying vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0046] refer to figure 1 , in one embodiment, a system for realizing fast perception, location and verification of vulnerabilities, characterized in that it includes a vulnerability awareness module, and the vulnerability awareness module includes:

[0047] The vulnerability information collection layer obtains the vulnerability information from the vulnerability information source through the vulnerability information collection technology;

[0048] The vulnerability information preprocessing layer preprocesses the vulnerability information obtained by the vulnerability information collection layer, and sends the vulnerability information to the vulnerability data storage layer according to the processing result;

[0049] The vulnerability data stora...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system for realizing rapid vulnerability sensing, locating and verifying comprises a vulnerability sensing module. The vulnerability sensing module comprises: a vulnerability information collectinglayer, wherein the vulnerability information is obtained from a vulnerability information source through a vulnerability information collecting technology; a vulnerability information pre-processing layer, which pre-processes the vulnerability information obtained by the vulnerability information collection layer and sends the vulnerability information into the vulnerability data storage layer according to the processing result; and a vulnerability data storage layer, which stores processed vulnerability information in the vulnerability database. The invention provides a method and a system for quickly sensing, locating and verifying vulnerability, which can quickly and reliably perceive vulnerability information, and can carry out the locating and verifying of vulnerability according to the vulnerability perceiving result.

Description

technical field [0001] The invention relates to the security of information assets, in particular to a method and system for fast perception, location and verification of vulnerabilities. Background technique [0002] Security vulnerabilities are certain types of problems that occur in various stages of the information system life cycle (design, implementation, operation and maintenance, etc.), these problems will affect the security of the system (confidentiality, integrity, availability), and they are different The form exists in the information system, and once it is used, it will affect the normal operation of the business carried by the information system and endanger the security of the information system and information. In recent years, network security incidents caused by vulnerabilities have emerged one after another. For example, the Heartbleed vulnerability broke out in April 2014. This vulnerability is the most widely affected high-risk vulnerability in recent y...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 吴勤勤刘晔沈伍强艾解清魏理豪温柏坚余志文梁智强陈敏王海柱伍晓泉胡海生陈志华刘洋吉威炎廖璐李虹何刚
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products