Unlock instant, AI-driven research and patent intelligence for your innovation.

System vulnerability scanning method, device, computer equipment and storage medium

A vulnerability scanning and vulnerability technology, applied in the field of security detection to ensure the safe operation of the system

Active Publication Date: 2020-12-22
BEIJING QIANXIN TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, there is often a delay between publishing the latest vulnerability information and adding the latest vulnerability scanning rules to the vulnerability scanner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System vulnerability scanning method, device, computer equipment and storage medium
  • System vulnerability scanning method, device, computer equipment and storage medium
  • System vulnerability scanning method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] see figure 1 , the present embodiment proposes a method for detecting system vulnerabilities, which specifically includes the following steps:

[0046] S1: In response to the system vulnerability issuing instruction, obtain the newly added vulnerability associated with the system under test in the system vulnerability issuing instruction, and generate a temporary scanning rule according to the description information of the newly added vulnerability; wherein the temporary scanning rule is used for Scan for the newly added vulnerabilities.

[0047]As computer applications become wider and more powerful, security vulnerabilities in information technology products have become a major factor in system and network threats. To put it figuratively, a security hole in a computer system is equivalent to a time bomb, hiding danger at any time. Therefore, the importance of security vulnerabilities is self-evident, and the timely release of security vulnerabilities and correspond...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system vulnerability scanning method and device, computer equipment and a computer storage medium, and the method comprises the steps: responding to a system vulnerability release instruction, obtaining a newly added vulnerability associated with a tested system in the system vulnerability release instruction, and generating a temporary scanning rule according to the description information of the newly added vulnerability; wherein the temporary scanning rule is used for scanning the newly added vulnerability; collecting operation parameters in the tested system, and forming routine scanning rules according to the operation parameters; wherein the routine scanning rule is used for scanning conventional vulnerabilities associated with the tested system; scanning thenewly added vulnerability according to the temporary scanning rule, and scanning the conventional vulnerability according to the routine scanning rule; and verifying all scanned vulnerabilities, andoutputting a verification report.

Description

technical field [0001] The invention relates to the technical field of security detection, in particular to a system vulnerability scanning method, device, computer equipment and storage medium. Background technique [0002] A vulnerability scanner is a hardware device used to scan for vulnerabilities in an enterprise network. Existing network vulnerability scanners all use rule-based matching technology, which forms a set of standard system vulnerabilities based on the analysis of security experts on network system security vulnerabilities and hacker attack cases and the actual experience of system administrators on network system security configuration. database, and then form corresponding matching rules on this basis, and the program automatically performs the analysis of system vulnerability scanning. The scanning results of the vulnerability scanner depend heavily on the richness of the system vulnerability database, and the vulnerabilities that are not included in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3688G06F11/3692
Inventor 聂君
Owner BEIJING QIANXIN TECH