A vulnerability monitoring and detecting system for an intelligent network information system

An information system, monitoring and detection technology, applied in the field of network security

Inactive Publication Date: 2019-01-08
北京华顺信安科技有限公司
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a loophole monitoring and detection system for intelligent network information systems, to solve the security problems of network assets in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability monitoring and detecting system for an intelligent network information system
  • A vulnerability monitoring and detecting system for an intelligent network information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, in particular to a vulnerability monitoring and detecting system for an intelligent network information system. The system comprises adata acquisition layer which is adapted to periodically identify network assets and obtain the original data of the network assets; a data aggregation layer which is adapted to obtain the original data of the network assets, analyze and put the labels one by one, classify and summarize according to the labels, and generate the classified data; the data aggregation layer is adapted to obtain the original data of the network assets, analyze and put the labels one by one, and generate the classified data according to the labels; a data storage layer which obtains the classification data, storesand analyzes the classification data according to the label, and generates a statistical report; and a Web presentation layer which is connected with the data storage layer. The system adopts multi-tier architecture to achieve data and program separation, foreground and background separation, interface and program separation, to ensure the safety of data, and comprehensive asset identification, vulnerability sweep fast, complete, accurate, can be faster positioning of risky assets.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a loophole monitoring and detection system used in an intelligent network information system. Background technique [0002] The rapid development of the Internet not only creates new opportunities for enterprises, but also brings new challenges to enterprise network security. Cyber ​​attacks have become one of the leading causes of business loss. In 2017, as many as 86% of companies in the world have experienced at least one cyber attack, and high-risk security breaches targeting corporate users frequently occur, and there are more and more trends: Struts2RCE, weak passwords for IOT devices, ES, CauchDB and other system extortion events. In the enterprise, more and more facilities are interconnected, and remote access, remote transmission, and information resource sharing between systems provide a favorable way for network penetration attacks. Because the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 孙波赵武龙专黄元飞陈禹张家旺
Owner 北京华顺信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products