A Vulnerability Discovery and Emergency Verification Implementation Method

An implementation method and vulnerability technology, applied in the field of network security, can solve problems such as cumbersome work and incompetence, and achieve the effects of flexible structure adjustment, improved efficiency and security, and simple system composition

Active Publication Date: 2021-07-13
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The work of this process is extremely cumbersome, and traditional vulnerability scanning products are no longer competent in terms of vulnerability inspection coverage and the effectiveness of analysis reports to help managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Vulnerability Discovery and Emergency Verification Implementation Method
  • A Vulnerability Discovery and Emergency Verification Implementation Method
  • A Vulnerability Discovery and Emergency Verification Implementation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.

[0029] like figure 1 -As shown in -6, a method for implementing vulnerability discovery and emergency verification includes the following steps:

[0030] S1. System configuration setting. First, according to the network structure and network scale information to be detected, specify the configuration scheme of the vulnerability detection system that meets the needs of the current vulnerability detection target;

[0031] S2, configuration of the vulnerability detection system. After completing step S1, according to the configuration scheme of the vulnerability detection system designed in step S1, first construct a vulnerability detection device according to the network structure to be detected and connect the vulnerability detection device with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a loophole discovery and emergency verification implementation method, comprising five steps of system configuration setting, loophole detection system configuration, loophole detection, loophole elimination and system upgrade. On the one hand, the invention has simple system structure and flexible structure adjustment, which can effectively meet the risk loophole detection, evaluation and early warning of different network systems and contents; Detect all kinds of vulnerability risks in the network, provide professional and effective security analysis and repair suggestions, and audit the repair effect according to the security management process, minimize the attack surface, thereby greatly improving network data management work efficiency and safety.

Description

technical field [0001] The invention relates to a loophole discovery and emergency verification implementation method, which belongs to the technical field of network security. Background technique [0002] The Internet security issue of using security loopholes to carry out network attacks is like a shadow in the sun, always accompanying the development of Internet industry applications. In recent years, the form of network security threats has also undergone different changes. The attack method has changed from a simple tool attack downloaded by a single hobbyist to an attack program specially written by organized professional technicians. The purpose of the attack has changed from proving personal technology A shift in power toward commercial or national information theft. [0003] Changes in new attack methods will still use various vulnerabilities, such as: the IE browser overflow vulnerability exploited in the Google Aurora attack incident, and the FEATHEADER remote c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12H04W12/126
CPCH04L63/1433H04W12/12
Inventor 刘晔沈桂泉唐亮亮周安龙震岳吴勤勤曾纪钧梁哲恒张金波
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products