Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning method and related device

A vulnerability scanning and vulnerability technology, used in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as high false negative and false positive rates, reduce false negative and false positive rates, and avoid false negatives and false positives. The effect of reporting

Active Publication Date: 2020-01-17
重庆紫光华山智安科技有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the open source vulnerability scanning software is only based on the analysis of simulated access request messages and response messages, not the actual access request messages and response messages. Therefore, there are high false negatives and false positives. Rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and related device
  • Vulnerability scanning method and related device
  • Vulnerability scanning method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0024] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of computer security, and provides a vulnerability scanning method and a related device. The vulnerability scanning method comprises: obtaining an access request message for accessing a tested system and a response message fed back by the tested system for the access request message when a test device runs a test case; and performing active vulnerability scanning on the tested system according to the access request message, the response message and a pre-stored rule base to generate an active vulnerability scanning result, whereinrules in the rule base are acquired from a preset vulnerability information platform in advance and stored locally. Active vulnerability scanning is performed on a tested system based on an access request message and a response message which are actually generated when a test case is operated in a CI environment, and meanwhile, a richer rule base and a containerized operation mode are adopted, sothat the missing report rate and the false alarm rate are greatly reduced.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to a vulnerability scanning method and a related device. Background technique [0002] Continuous Integration CI (Continuous Integration, CI) is a software development practice. In practice, as long as the code changes, it will automatically run the build, unit test, integration, and comprehensive test, and finally feedback the running results. CI is widely used in agile development because of its advantages of quickly exposing errors, ensuring code submission quality, reducing overall integration risk, and promoting rapid product iteration. [0003] In the CI environment, in order to continuously evaluate the security of the system running the changed code and discover security vulnerabilities in the system running the changed code in a timely manner, the existing technology usually integrates open source vulnerability scanning software into the CI environment In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577G06F2221/034H04L63/1433
Inventor 曾勇
Owner 重庆紫光华山智安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products