Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network security test system based on embedded artificial intelligence and an implementation method

A technology of network security and artificial intelligence, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems affecting the accuracy of detection results, the inability to discover potential security problems in time, the unfavorable rapid completion of security testing process and the discovery of loopholes, etc. problem, achieve the effect of lowering the threshold and easy operation

Pending Publication Date: 2019-05-07
广州云趣信息科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For traditional network security testing, the general process is "clear target->information collection->vulnerability detection->vulnerability verification->information analysis->obtain what is needed->information collation->form a report", and the corresponding process operation needs to be safe Testers have certain industry technical knowledge, and the detection results are often different due to the different knowledge reserve, professional sensitivity and vulnerability information database data volume of security testers. Therefore, traditional manual network security testing may not be able to detect in time. Possibility of potential security issues, and affect the accuracy of detection results; In addition, related security testing process such as manual execution, compared with automated security testing, the former may mean more time overhead, which is not conducive to security Fast completion of the testing process and vulnerability discovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security test system based on embedded artificial intelligence and an implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0021] see figure 1 , a network security testing system and implementation method based on embedded artificial intelligence, including a middleware-based distributed computing module, an analyzer component, an intranet network layer penetration testing component, a Web and operating system penetration testing component, and a report display components, where:

[0022] The distributed computing module based on middleware is used to ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer application, and discloses a network security test system based on embedded artificial intelligence and an implementation method. The network security test system comprises a distributed computing module based on middleware, an analyzer component, an intranet network layer penetration test component, a Web and operation system penetration test component and a report display component. According to the invention, embedded artificial intelligence is introduced to take over and automatically execute related safety test processes. Compared with conventional artificial intelligence, related equipment of the embedded artificial intelligence does not need to access a cloud data center through networking to carry out large-scale calculationto realize the artificial intelligence, all AI algorithms are executed locally, data processing requests with high throughput can be better coped with, and real-time human-computer interaction and decision control can be carried out; In addition, due to the fact that software and hardware are successfully integrated, the embedded artificial intelligence is easy and convenient to operate, the threshold of a safety test can be better lowered, and data processing requirements under various severe environment conditions can be better met.

Description

technical field [0001] The invention belongs to the field of computer application, and in particular relates to an implementation method of a network security testing system based on embedded artificial intelligence. Background technique [0002] In traditional network security testing, the general process is "clarification of goals -> information collection -> vulnerability detection -> vulnerability verification -> information analysis -> acquisition required -> information sorting -> report formation", and the corresponding process operations require security Testers have certain industry technical knowledge, and the test results are often different due to the knowledge reserve, professional sensitivity and vulnerability information database data volume of security testers. Therefore, traditional manual network security testing may fail to detect in time. The possibility of potential security problems and affect the accuracy of the detection results; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/50G06F9/54H04L12/26
Inventor 邵德伟何明蔚朱栩
Owner 广州云趣信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products