Network asset fingerprint identification method, system and device

A fingerprint identification and network asset technology, applied in the field of network security, can solve problems such as lax asset supervision, easy to attack and difficult to prevent security loopholes, and inefficient event handling

Active Publication Date: 2019-10-11
国家工业信息安全发展研究中心
View PDF5 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a network asset fingerprint identification method, system, and equipment, which are used to solve the probl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset fingerprint identification method, system and device
  • Network asset fingerprint identification method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The embodiment of the present invention relates to a method, system, and device for network asset fingerprint identification and risk warning. The technical solution of the embodiment of the present invention detects surviving hosts in network space through an asynchronous stateless scanning mechanism; identifies surviving hosts through task distribution and scheduling strategies The asset fingerprint information and update the fingerprint weight; use the method based on fingerprint feature rule matching to discover potential risks of host assets; execute custom vulnerability scanning programs and vulnerability mining tools to verify potential risks, and issue risk warning notifications.

[0066] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network asset fingerprint identification method, system and device, and the method comprises the steps: carrying out the detection of a survival host under a target IP segment through an asynchronous stateless scanning mechanism, storing the address of the survival host in an asset scanning queue, and carrying out the asset identification task distribution of the survivalhost under the asset scanning queue; and setting an initial fingerprint hit rate for pre-stored common asset fingerprint data, and calling an asset detection engine to perform asset fingerprint identification on the survival host in the asset scanning queue through active detection and fingerprint rule feature library matching based on the fingerprint hit rate.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network asset fingerprint identification method, system and equipment. Background technique [0002] With the rapid development of network technology, the country pays more and more attention to network security. The number of hosts connected to the Internet is increasing at an alarming rate. As network assets are the basis for the normal operation of business systems, systematic supervision is very necessary. According to Gartner, currently less than 25% of organizations in the world have proper IT asset management mechanisms, which have brought serious security risks to network assets. How to effectively fingerprint and manage network assets has become a challenge for most enterprises and organizations. huge challenge. Therefore, how to fully grasp the network asset information related to open ports, protocols, domain names, device types, models, manufacturers, appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0263H04L63/1433H04L63/10H04L63/20
Inventor 刚占慧汪礼俊张洪赵慧杨安赵阳光鞠远孙立立黄海波杨杰赵凯丽朱丽娜周瑞坤张晓帆高羽茜陈皓李俊陈雪鸿
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products