Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability scanning method and related device

A vulnerability scanning and vulnerability technology, applied in computer security devices, instruments, computing, etc., can solve problems such as high false negative and false positive rates

Active Publication Date: 2021-09-10
重庆紫光华山智安科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the open source vulnerability scanning software is only based on the analysis of simulated access request messages and response messages, not the actual access request messages and response messages. Therefore, there are high false negatives and false positives. Rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and related device
  • Vulnerability scanning method and related device
  • Vulnerability scanning method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0024] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention relates to the field of computer security technology, and provides a vulnerability scanning method and related devices, the method comprising: obtaining an access request message for accessing the system under test sent by the test equipment when running a test case, and the system under test for accessing Response message for request message feedback; Active vulnerability scanning is performed on the system under test according to the access request message, response message and pre-stored rule base to generate active vulnerability scanning results. obtained and stored locally. Actively scan the system under test for vulnerabilities based on access request messages and response messages actually generated when running test cases in the CI environment. At the same time, it adopts a richer rule base and containerized operation mode, which greatly reduces the rate of false negatives and false positives. .

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to a vulnerability scanning method and a related device. Background technique [0002] Continuous Integration CI (Continuous Integration, CI) is a software development practice. In practice, as long as the code changes, it will automatically run the build, unit test, integration, and comprehensive test, and finally feedback the running results. CI is widely used in agile development because of its advantages of quickly exposing errors, ensuring code submission quality, reducing overall integration risk, and promoting rapid product iteration. [0003] In the CI environment, in order to continuously evaluate the security of the system running the changed code and discover security vulnerabilities in the system running the changed code in a timely manner, the existing technology usually integrates open source vulnerability scanning software into the CI environment In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577G06F2221/034H04L63/1433
Inventor 曾勇
Owner 重庆紫光华山智安科技有限公司