A security vulnerability automatic verification system based on a crowd test platform

An automatic verification and vulnerability technology, applied in the field of network security, can solve the problems of failure to deal with vulnerabilities, difficult vulnerability discovery and verification, false positives, etc.

Active Publication Date: 2019-02-12
CHINA INFOMRAITON CONSULTING & DESIGNING INST CO LTD
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of defect may be a simple software bug at first, such as incomplete coverage of test cases and chaotic software business logic, but after artificial research and utilization, it becomes a vulnerability that makes the software break away from the normal operation process or high-level permissions are exploited
[0004] Today's major security platforms and security vulnerability scanning tools are equipped with automatic or manual vulnerability discovery and vulnerability collection functions, but users of most platforms and tools lack a set of efficient vulnerability verification methods and processes, and fail to identify vulnerabilities. timely disposal
From a practical point of view, although the hidden security risks in the network can be found by using the missing scanning tool, there are quite a few false positives in the current vulnerability scanning results. To verify the existence of vulnerabilities, testers need to have high professional quality. Have a certain understanding of various vulnerability principles and utilization tools, put forward high requirements for the ability of testers, and spend a lot of time to verify one by one, it is difficult to realize large-scale vulnerability discovery and verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security vulnerability automatic verification system based on a crowd test platform
  • A security vulnerability automatic verification system based on a crowd test platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0064] Such as figure 1 , figure 2As shown, the method of the present invention is developed by combining Java with python scripting language, and the public testing platform adopts a standard interface, which can be docked with other security systems. The overall system module topology of the vulnerability automation verification platform is shown in Figure 1, which is divided into three parts: client, control end and verification end.

[0065] The client includes front-end and back-end user login, task configuration, task submission, result display, and data transmission module A. The task configuration module is responsible for configuring the vulnerability samples submitted by the public testers and the information corresponding to the vulnerabilities; the result display module is responsible for echoing the progress and results of the vulnerabil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security vulnerability automatic verification system based on a crowd testing platform. The system executes the following steps of 1, collecting the verification information;2, implementing the authentication information encapsulation, classifying all kinds of vulnerabilities collected by security vulnerability automatic verification system according to their types, extracting the key information from vulnerability detection results for each type of vulnerabilities, taking the key information as the necessary field data to submit the vulnerabilities, collecting the required data according to the fields, and packaging the data in a unified interface modularly; 3, searching for an authentication strategy, and selecting an appropriate attack script template and a vulnerability utilization tool according to suspicious vulnerability identification and type information; 4, carrying out automatic vulnerability verification; 5, clearing the verification trace; 6, generating a scanning report.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to an automatic security loophole verification system based on a public testing platform. Background technique [0002] In recent years, malicious Internet attacks have occurred frequently, and the number of attack samples captured by major security platforms has continued to increase. Malicious sample analysis has become the focus of Internet security research. Vulnerability verification refers to verifying whether a sample uses a software vulnerability to attack, and the specific verification content includes the type of vulnerability and the means of attack. Most of the existing security public testing platforms, for the security vulnerabilities submitted by users, the process of verifying the vulnerabilities usually adopts manual review and verification. And the processing efficiency is low, and the response is not timely. Therefore, it is meaningful to study a new ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/36
CPCG06F11/3672G06F21/577
Inventor 王小鹏戴春雷杨盾王涵高丽芬叶伟杨波
Owner CHINA INFOMRAITON CONSULTING & DESIGNING INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products