Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and detection device for detecting command execution vulnerability

A technology for command execution and command detection, applied in electrical components, transmission systems, etc., can solve the problems of large personnel input, poor timeliness, low accuracy, etc., to improve security, reduce false alarm rate, and reduce the risk of blocking. Effect

Inactive Publication Date: 2019-11-08
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing asset security protection system requires a large amount of personnel investment and has poor timeliness. The protection coverage is not comprehensive enough, the accuracy rate is low, and it cannot effectively protect against 0-Day vulnerabilities. There is a large technical gap with the current attack methods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and detection device for detecting command execution vulnerability
  • Method and detection device for detecting command execution vulnerability
  • Method and detection device for detecting command execution vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0019] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting a command execution vulnerability. The method comprises the steps of obtaining network environment data of network equipment; processing the network environment data based on the ontology knowledge base by utilizing the scene data model to generate first scene data; and exporting second scenario data from the first scenario data by using a predetermined rule, wherein the second scenario data is used for judging whether the network device has a command execution vulnerability. The invention further provides a detection device for detecting the command execution vulnerability, an electronic device and a computer readable storage medium.

Description

technical field [0001] The present disclosure relates to the field of network security artificial intelligence, and in particular to a method and detection device for detecting command execution vulnerabilities. Background technique [0002] With the development of computer network technology, the traditional security protection system is far from enough to cope with the ever-changing and improved attacks of hackers. With the rapid increase in the types and quantities of technological assets in various industries, a series of loopholes will inevitably appear in the management of assets. The existing asset security protection system requires a large amount of personnel investment and has poor timeliness. The protection coverage is not comprehensive enough, the accuracy rate is low, and it cannot effectively protect against 0-Day vulnerabilities. There is a large technical gap with the current attack methods. How to use machines to collect network security data in real time a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 孙杰王金希郭运雷黄寅
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More