Automatic intelligent mining method for network security vulnerabilities of broadcast television key information infrastructure

A technology of infrastructure network and key information, applied in the field of automatic intelligent mining of network security vulnerabilities of key information infrastructure of radio and television, which can solve problems such as misconfiguration, insecure default setting applications, and leakage of sensitive information.

Pending Publication Date: 2019-07-05
国家广播电视总局广播电视规划院
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even misconfigurations can create vulnerabilities, as can applications that contain insecure default settings or are not securely configured by administrators
For example, the web server is configured to allow any user to pass through any directory path on the system, which may lead to the disclosure of some sensitive information stored on the web server, such as passwords, source code or customer information, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic intelligent mining method for network security vulnerabilities of broadcast television key information infrastructure
  • Automatic intelligent mining method for network security vulnerabilities of broadcast television key information infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 As shown, the present invention is an automatic intelligent mining method for network security loopholes in key information infrastructure of radio and television, comprising the following steps,

[0022] Step S101: Parse the network packet data into session data. In this step, the data communicated by various protocols can be extracted, and the following takes Hyper Text Transfer Protocol (Hyper Text Transfer Protocol, HTTP) data as an example to describe in detail. Firstly, the network packet data obtained from the data source is parsed into session data in text format. For HTTP protocol data, the HTTP protocol stack is used to parse it into HTTPPOST session data. The parsed session data includes HTTP header and HTTP entity part. To parse and restore HTTP POST session data according to the HTTP protocol stack, it is necessary to first build a Transmission Control Protocol (TCP) stream, and then parse according to the HTTP session. For example, use ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security vulnerabilities, in particular to an automatic intelligent mining method for network security vulnerabilities of broadcast television key information infrastructure, which comprises the following steps of: step S101, analyzing network packet data into session data; step S102, judging whether the entity part of the session data conforms to a preset data format or not; step S103, performing multi-mode matching on the session data meeting the preset data format; and step S104, labeling according to the data format of the session data and the hit position of a preset feature string. After the method is adopted, the invalid data which do not conform to the preset data format can be filtered out by judging the preset data format ofthe analyzed session data, so that the data extraction time is shortened; besides, the Web application security vulnerability analysis is more thorough, the source of vulnerability generation can bepointed out, and the whole vulnerability triggering process is analyzed, so that the network security of the broadcast television key information infrastructure is greatly enhanced.

Description

technical field [0001] The invention relates to the technical field of network security loopholes, in particular to an automatic intelligent mining method for network security loopholes of key information infrastructure of radio and television. Background technique [0002] With the development of network and computer technology, the number of people using the network is increasing, and the network security environment is deteriorating day by day. The increasing sophistication of network and software technologies has provided fertile ground for all kinds of cyber attacks and hacking. The endless attacks and loopholes on the network make network users extremely annoying, especially web developers and administrators of various websites who have frequent contact with the network. [0003] Among various network hazards, web application security vulnerabilities are the most harmful. Specifically, Web application security vulnerabilities refer to potential security risks in Web ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L63/0245H04L67/14H04L67/02
Inventor 肖辉
Owner 国家广播电视总局广播电视规划院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products