Automatic vulnerability detection system and method based on port identification
A port identification and detection system technology, applied in the field of network security, can solve the problems of affecting the verification efficiency of new vulnerabilities, exploiting vulnerabilities, and consuming a lot of time, and achieve the effect of reducing emergency response time and labor costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0033] An automated vulnerability detection system based on port identification, including a TCP semi-connection-based port quick scan module, a port protocol identification module, an asset classification storage module, a vulnerability verification module, and an asset visualization display module.
[0034] The port fast scanning module is used to scan the IP segment of the digital asset, identify the open service of the digital asset of the enterprise through the port, and output the result to the port protocol identification module.
[0035] The port protocol identification module is used to identify the protocol and service type used by the current port.
[0036] The asset classification storage module is used to classify and store the data scanned by the port fast scanning module and classify and store the data identified by the port protocol identification module.
[0037] Specifically, the asset classification storage module classifies data according to port characteri...
Embodiment 2
[0043]This embodiment discloses an automatic vulnerability detection method based on port identification, based on the automatic vulnerability detection system based on port identification in Embodiment 1, specifically including the following steps:
[0044] Step 1. The scanning engine adopts distributed deployment according to the number of enterprise digital assets;
[0045] Step 2. Every time the operation and maintenance personnel go online to one or more servers, they immediately fill in the asset ip into the list to be scanned; among them, some intranet hosts need to be configured with springboards to complete accurate scanning;
[0046] Specifically, the automatic vulnerability detection method based on port identification of the present invention does not need to install any client on the terminal device, which will greatly reduce the work of operation and maintenance personnel, and the scanning work and vulnerability verification work can be started at regular interval...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com