Vulnerability detection method and system based on fuzzy technology

A technology of vulnerability detection and fuzzy technology, applied in the field of vulnerability detection based on fuzzy technology, it can solve the problems of low accuracy, complex operation, single vulnerability, etc., to achieve the effect of automation and intelligence, and improve vulnerability coverage.

Active Publication Date: 2020-01-17
CHINA ELECTRONIS TECH INSTR CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The detection method in the payload library is aimed at a single vulnerability, and the accuracy of detecting vulnerabilities is low.
There are more and more types of network information system equipment, and the types of applications are becoming more and more diverse. The traditional network space detection target branch will be more and more, and the operation will be more complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and system based on fuzzy technology
  • Vulnerability detection method and system based on fuzzy technology
  • Vulnerability detection method and system based on fuzzy technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] In the technical solutions disclosed in one or more embodiments, such as figure 1 As shown, a vulnerability detection method based on fuzzy technology includes the following steps:

[0031] Step 1, set up the fuzzy target decision tree model, adopt the fuzzy target decision tree model to formulate the rough data of target recognition scanning as the target recognition scanning strategy;

[0032] Step 2, determine the communication port number to communicate with the target host according to the target identification scanning strategy, obtain the information of the target host, and determine the detection target;

[0033] Step 3. According to the target host information, use a fuzzy algorithm to scan the detection target for vulnerabilities to determine whether there are vulnerabilities.

[0034] In step 1, a fuzzy target decision tree model is established, and the target identification scanning strategy of the fuzzy target decision tree model is adopted, including the ...

Embodiment 2

[0065] This embodiment provides a vulnerability detection system based on fuzzy technology, including:

[0066] A target recognition strategy formulation module; used to establish a fuzzy target decision tree model, and use the fuzzy target decision tree model to formulate the rough data of the target recognition scan as a target recognition scan strategy;

[0067] Detection target determination module: used to determine the communication port number to communicate with the target host according to the target identification scanning strategy, obtain the information of the target host, and determine the detection target;

[0068] Vulnerability Judgment Module: It is used to scan the detection target for vulnerabilities based on the information of the target host using a fuzzy algorithm to determine whether there is a vulnerability.

[0069] Further, the fuzzy target decision tree model includes a fuzzy judgment premise node and a decision tree node with an expected value; the f...

Embodiment 3

[0075] This embodiment provides an electronic device, including a memory, a processor, and computer instructions stored in the memory and executed on the processor. When the computer instructions are executed by the processor, the steps described in the method in Embodiment 1 are completed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and system based on a fuzzy technology, and the method comprises the following steps: building a fuzzy target decision tree model, and employingthe fuzzy target decision tree model to formulate a target recognition scanning strategy; determining a communication port number to communicate with a target host according to the target identification scanning strategy, obtaining information of the target host, and determining a detection target; and performing vulnerability scanning on the detection target by adopting a fuzzy algorithm according to the target host information, and judging whether vulnerability exists or not. A target identification scanning strategy for searching and identifying a target host can be obtained through the decision tree; outputting an approximate range of the target host information and an open port number; therefore, the target host is determined, the test case or the test data packet for vulnerability testing is generated by adopting the fuzzy algorithm according to the target host information returned by the target host, vulnerability testing is carried out, a user can carry out vulnerability scanning without professional knowledge, and automation and intelligence of vulnerability scanning are realized.

Description

technical field [0001] The present disclosure relates to the relevant technical field of network vulnerability detection, and specifically relates to a method and system for detecting a vulnerability based on fuzzy technology. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art. [0003] With the rapid development of the Internet, the situation of network information security is becoming more and more serious, and various forms of attacks and stealing behaviors emerge in an endless stream, which pose a serious threat not only to personal information and property, but also to national defense construction and various fields of the national economy. In recent years, a large number of security incidents have been exposed. Therefore, automatic, fast and effective vulnerability mining has become an important research direction in the information security i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1433H04L41/145H04L41/142
Inventor 王天罡刘兆洋程震吴恒奎董继刚孙宏
Owner CHINA ELECTRONIS TECH INSTR CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products