Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability defense method and device

A vulnerability and defense system technology, applied in the field of vulnerability defense methods and devices, can solve the problems of private information acquisition, system paralysis, etc., achieve the effect of protecting private information, system stability, and improving the overall security level

Inactive Publication Date: 2019-05-28
吉林亿联银行股份有限公司
View PDF14 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a dangerous period of time between getting the vulnerability and patching and strengthening it. If the vulnerability is maliciously attacked during this dangerous period, private information will be obtained, and more seriously, the system will be paralyzed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability defense method and device
  • Vulnerability defense method and device
  • Vulnerability defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0075] Optionally, in another embodiment of the present invention, an implementation manner of step S103 includes:

[0076] Obtain the CVE number of the vulnerability.

[0077] Specifically, after the vulnerability scanning system scans the vulnerability, the vulnerability information of the vulnerability is extracted to obtain the CVE number of the vulnerability, or the CVE number of the vulnerability can be obtained after the vulnerability scanning system scans the vulnerability.

[0078] Determine whether the CVE number of the defense system that needs to develop a defense strategy is the same as the CVE number of the vulnerability.

[0079] Among them, in each defense system, information such as the CVE number corresponding to the published public vulnerability and the corresponding defense strategy can be stored in advance. The defense strategy is used to defend against the vulnerability and can be used to block the vulnerability.

[0080] Specifically, if the CVE number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability defense method and apparatus. The method comprises the steps of obtaining vulnerability information of a vulnerability; wherein the vulnerability information atleast comprises a network address where a vulnerability is located; based on the network address where the vulnerability in the vulnerability information is located, determining a defense system needing to formulate a defense strategy; Judging whether a defense strategy corresponding to the vulnerability information exists in the defense system needing to formulate the defense strategy or not; wherein the defense strategy is used for defending vulnerabilities; If it is judged that the defense strategy needs to be formulated in the defense system; a defense strategy corresponding to the vulnerability information exists; if yes, controlling a defense system needing to formulate a defense strategy; starting a defense strategy corresponding to the vulnerability information, Therefore, the scanning system and the defense system are accurately linked according to the vulnerabilities found in the enterprise, and when the obtained vulnerabilities are within the dangerous time, a defense strategy is executed on the vulnerabilities in time through the defense system, so that the system and information security is protected within the dangerous time, and the stable operation of the information system is ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, and more specifically relates to a method and device for defending against loopholes. Background technique [0002] With the rapid development of the Internet, all kinds of businesses currently provide external services through IT systems, and the IT infrastructure (operating system, database, middleware, etc.) With continuous improvement, there will be new security vulnerabilities every day. On the one hand, various security vendors will provide detection equipment and protection equipment to detect and protect vulnerabilities. On the other hand, enterprises will purchase related equipment to ensure the security of information systems within the enterprise. [0003] The current method for dealing with vulnerabilities in the basic environment in the enterprise is: scan the system for vulnerabilities to find vulnerabilities, and patch and strengthen the vulnerabilities. Considering the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王照文邹帮山秦旭果孙鹏飞韩秀文
Owner 吉林亿联银行股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products