Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Loophole finding and emergency verification implementation method

An implementation method and vulnerability technology, applied in the field of network security, can solve problems such as cumbersome work and incompetence, and achieve the effects of flexible structural adjustment, improved efficiency and security, and strong data compatibility.

Active Publication Date: 2019-02-12
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The work of this process is extremely cumbersome, and traditional vulnerability scanning products are no longer competent in terms of vulnerability inspection coverage and the effectiveness of analysis reports to help managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loophole finding and emergency verification implementation method
  • Loophole finding and emergency verification implementation method
  • Loophole finding and emergency verification implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical means, creative features, objectives and effects of the present invention easy to understand, the present invention will be further explained below in conjunction with specific embodiments.

[0029] Such as figure 1 As shown in 6, a method for implementing vulnerability discovery and emergency verification includes the following steps:

[0030] S1, system configuration setting, first, according to the network structure and network scale information to be detected, specify the vulnerability detection system configuration plan that meets the needs of the current vulnerability detection target;

[0031] S2: Vulnerability detection system configuration. After step S1 is completed, the vulnerability detection system configuration scheme designed according to step S1 is first constructed according to the network structure to be detected, and the vulnerability detection radar is connected to the network structure to be detected. Enter the vulnerability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a loophole finding and emergency verification implementation method comprising the five steps of system formation setting, loophole detection system configuration, loophole detection, loophole elimination and system upgrade. On the one hand, the system is simple in formation, flexible in structure adjustment, and capable of effectively meeting the risk loophole detection,assessment and pre-warning of the different network systems and contents; on the other hand, the data compatibility capacity is strong, the data detection operation efficiency and accuracy are high, various vulnerability risks in the network can be efficiently detection all around, the professional and effective security analysis and repair advice are provided, auditing is performed on a repair result through fitting with the security management process, the attack surface is furthest reduced, and thus the efficiency and security of the network data management operation are greatly improved.

Description

Technical field [0001] The invention relates to a method for realizing loophole discovery and emergency verification, and belongs to the technical field of network security. Background technique [0002] The Internet security problem of using security vulnerabilities to carry out network attacks is like a shadow under the sun, which has always been accompanied by the application development of the Internet industry. In recent years, the form of network security threats has also changed in different ways. The attack mode has changed from simple tool attacks that a single hobbyist can download at will to an attack program specially written by organized professional and technical personnel. The purpose of the attack has changed from proving personal technology. Power shifts to commercial or national information theft. [0003] Changes in new attack methods will still exploit various vulnerabilities, such as the IE browser overflow vulnerability used in the Google Aurora attack, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/12H04W12/126
CPCH04L63/1433H04W12/12
Inventor 刘晔沈桂泉唐亮亮周安龙震岳吴勤勤曾纪钧梁哲恒张金波
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products