Environment-based vulnerability scanner

A vulnerability scanner and environment technology, applied in the field of environment-based vulnerability scanners, can solve the problem of not having illegal content detection and black chain detection technology, and achieve the effect of improving accuracy and strengthening web page detection standards.

Inactive Publication Date: 2019-10-01
电子科技大学成都学院
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Every platform has vulnerabilities in both hardware and software, and now most of the conventional vulnerability scanning systems do not have illegal content detection and black chain detection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Environment-based vulnerability scanner

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The environment-based vulnerability scanner provided by the preferred embodiment of the present invention includes the following steps:

[0033] Step A: Custom creation of the violation feature database S 1 , import the Uniform Resource Locator URLx of the existing black chain violation characteristics;

[0034] Step B: Receive the external access request and the URLy, and download the web page file H of the access request 1 ;

[0035] Step C: Create a regular expression REGEX in web page format;

[0036] Step D: Customize and create a web page link feature database S 2 ;

[0037] Step E: Get the web page file H 1 Use the regular expression REGEX(URLz) to detect whether the URLz containing the link on the website conforms to the webpage format;

[0038] Step F: If it is detected by REGEX (URLz) that the URLz conforms to the web page format, then check whether the URLz exists in the violation characteristic database S1 by querying the violation characteristic datab...

Embodiment 2

[0040] In this embodiment, on the basis of Embodiment 1, preferably, the steps B, C and D include the following steps:

[0041] StepBCD 1 : Get the downloaded web page file H 1 The source code of the web page;

[0042] StepBCD 2 : Utilize the regular expression REGEX to match the URLz with the webpage link, and store it in the webpage link characteristic database S2.

[0043] StepBCD 3 : By linking the feature database S from the webpage each time 2 Obtain the URLz of each webpage link in turn, and access the URLz of the webpage link through simulation;

[0044] StepBCD 4 : By accessing the webpage link URLz, download the source code of the webpage of the current link and find out whether the source code of the webpage of the link contains illegal characters.

[0045] StepBCD 4: If it is judged that the webpage link URLz is a black link, the violation feature database S 1 Continue to save the URLz; if it is judged that the webpage link URLz is not a black link, the vi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an environment-based vulnerability scanner, and belongs to the field of network security. The method comprises the following steps: creating a violation characteristic databaseS1, importing a uniform resource locator URLx of existing black chain violation characteristics; downloading the webpage file H1 of the access request; creating a regular expression REGEX of the webpage format; creating a webpage link feature database S2 in a user-defined mode; obtaining URLz containing links on the webpage file H1, and detecting whether the URLz conforms to the webpage format ornot by utilizing a regular expression REGEX (URLz); if it is detected that the URLz conforms to the webpage format through REGEX (URLz), detecting whether the URLz exists in the violation feature database S1 or not by inquiring the violation feature database S1, if yes, judging that the URLz is a black chain, and otherwise, judging that the URLz is not a black chain. According to the method, through actual requirements in work, the problems of labor cost and low efficiency caused by traditional vulnerability scanning are solved, the black chain recognition rate is increased, and the hidden black chain is recognized.

Description

technical field [0001] The invention belongs to the field of network security and relates to an environment-based vulnerability scanner. Background technique [0002] With the rapid development of computer networks, it has brought great convenience to society, life and work. We can easily use the computer network to spread news to the outside world, and we can conduct transactions on the Internet. However, there are certain loopholes in the computer network, which are defects in the specific implementation of hardware, software, and protocols of the computer system or in the system security strategy. Once a vulnerability is discovered, it will be exploited by outside intruders to access or destroy the system in an illegal and unauthorized manner. Every platform has vulnerabilities in both hardware and software, and most conventional vulnerability scanning systems do not have illegal content detection and black chain detection technologies. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034G06F2221/2119
Inventor 代琪怡代荣瑞杨玲李茂毅廖西罗焱
Owner 电子科技大学成都学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products