Automatic vulnerability detection system and method based on port identification

A port identification and detection system technology, applied in the field of network security, can solve the problems of affecting the verification efficiency of new vulnerabilities, exploiting vulnerabilities, and consuming a lot of time, and achieve the effect of reducing emergency response time and labor costs

Inactive Publication Date: 2018-12-18
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] a. Crawl through URL links to capture all URLs of an application. In this scanning method, crawling URLs and adding attack loads to each URL will consume a lot of time, which will seriously affect the verification efficiency of new vulnerabilities;
[0007] b. In multiple vulnerability scanning software and platform evaluations, there is a lack of asset discovery functions, which is time-consuming and laborious, requiring manual addition of enterprise assets to the list to be scanned;
[0008] c. Most of them use the combination of man and machine, which cannot complete the detection tasks of massive assets in a short period of time, which may lead to the vulnerability being exploited before it is discovered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] An automated vulnerability detection system based on port identification, including a TCP semi-connection-based port quick scan module, a port protocol identification module, an asset classification storage module, a vulnerability verification module, and an asset visualization display module.

[0034] The port fast scanning module is used to scan the IP segment of the digital asset, identify the open service of the digital asset of the enterprise through the port, and output the result to the port protocol identification module.

[0035] The port protocol identification module is used to identify the protocol and service type used by the current port.

[0036] The asset classification storage module is used to classify and store the data scanned by the port fast scanning module and classify and store the data identified by the port protocol identification module.

[0037] Specifically, the asset classification storage module classifies data according to port characteri...

Embodiment 2

[0043]This embodiment discloses an automatic vulnerability detection method based on port identification, based on the automatic vulnerability detection system based on port identification in Embodiment 1, specifically including the following steps:

[0044] Step 1. The scanning engine adopts distributed deployment according to the number of enterprise digital assets;

[0045] Step 2. Every time the operation and maintenance personnel go online to one or more servers, they immediately fill in the asset ip into the list to be scanned; among them, some intranet hosts need to be configured with springboards to complete accurate scanning;

[0046] Specifically, the automatic vulnerability detection method based on port identification of the present invention does not need to install any client on the terminal device, which will greatly reduce the work of operation and maintenance personnel, and the scanning work and vulnerability verification work can be started at regular interval...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an automatic vulnerability detection system based on port identification, includes a port quick scan module, a port protocol identification module, an asset classification storage module, a vulnerability verification module, an asset visualization display module, fast-scans that asset IP segment through the port fast-scan module, and outputs the result to the port protocolidentification module for fine service version fingerprint identification, classifies and stories the result after identification according to IP, port, service version in an asset classification storage module, and adds the filtered specific digital assets to the vulnerability validation module to begin vulnerability validation, at last, the t results are output and deliver to the operation and maintenance personnel for repair. The automatic vulnerability detection system and the automatic vulnerability detection method based on the port identification of the invention can complete the safetydetection of the enterprise assets within one hour of the vulnerability outbreak, greatly reduce the emergency response time and the human cost, and ensure that the enterprise completes the vulnerability discovery and repair before being attacked to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an automatic loophole detection system and method based on port identification. Background technique [0002] With the rapid development of the Internet economy and the rapid popularization of e-commerce, computers are involved in various links such as payment and logistics. With the outbreak of a large number of security problems, new methods are needed to quickly discover and repair a large number of loopholes. [0003] In the long-term vulnerability mining process, we often start from the system, business, or application, and IP address, and traverse each parameter of an application by submitting a large number of attack payloads to determine whether a vulnerability exists. This security detection This method is feasible for daily detection, but once a new high-risk vulnerability breaks out, this method will greatly reduce the efficiency of security detection and do a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06Q10/00
CPCG06F21/577G06Q10/20
Inventor 张攀
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products