Web application vulnerability detection rule engine implementation method and terminal

A technology of vulnerability detection and implementation method, applied in electrical components, transmission systems, etc., can solve problems such as long development cycle convergence period, uneven code quality, etc., and achieve the effect of improving development quality, lowering development threshold, and reducing development cycle

Inactive Publication Date: 2019-11-01
北京墨云科技有限公司
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, you will also face problems that arise in the general software development process, such as uneven code quality, unavoidable bugs, a longer convergence cycle than the development cycle, additional code security issues, and code maintenance costs.
[0004] In addition, in addition to considering how to implement the vulnerability detection logic, developers also need to consider the writing of process and interface codes that have nothing to do with the vulnerability detection logic, so they cannot focus on the implementation of the vulnerability detection logic. Therefore, As the number of vulnerabilities increases, the corresponding number of vulnerability detection plug-ins that need to be developed increases, and the disadvantages of traditional detection plug-ins become more and more obvious.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web application vulnerability detection rule engine implementation method and terminal
  • Web application vulnerability detection rule engine implementation method and terminal
  • Web application vulnerability detection rule engine implementation method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0026] Among them, in the description of the embodiments of this application, unless otherwise specified, " / " means or means, for example, A / B can mean A or B; "and / or" in this article is only a description of associated objects The association relationship of indicates that there may be three kinds of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. In addition, in the description of the embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Web application vulnerability detection rule engine implementation method and device, a terminal and a storage medium. The method comprises the steps of sending a vulnerability scanning http request constructed based on rule statement description to a Web application server; receiving a response result of the Web application server to the vulnerability scanning http request; and matching the response result based on vulnerability scanning strategy information in a rule to obtain a matching result. According to the Web application vulnerability detection rule engine implementation method and device, the terminal and the storage medium provided by the invention, the development period of the vulnerability detection plug-in is shortened.

Description

technical field [0001] The present invention relates to the technical field of web application vulnerability detection rule engines, in particular to a method, device, terminal and storage medium for realizing a web application vulnerability detection rule engine. Background technique [0002] Traditional vulnerability detection systems are all plug-in. Security developers need to write vulnerability detection plug-ins based on a certain programming language according to the unified input and output requirements, so that they can be loaded and run by the system to realize the vulnerability detection function. [0003] The development process of the vulnerability detection plug-in is also a software development process, which needs to go through the steps of coding, joint debugging, testing, deployment, and going online in the general software development cycle. At the same time, you will also face problems that arise in the general software development process, such as uneve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L67/02
Inventor 赵岱翀刘兵谢鑫郗朝旭
Owner 北京墨云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products