Bug detection method, device and equipment and computer storage medium

A vulnerability detection and host technology, applied in the field of financial technology, can solve problems such as the impact of normal business attacks, network stability limitations, and low efficiency of vulnerability detection

Pending Publication Date: 2020-02-07
WEBANK (CHINA)
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned detection methods are limited by the stability of the network on the one hand, and on the other hand may bring real attack impact on normal business, making the efficiency of vulnerability detection very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bug detection method, device and equipment and computer storage medium
  • Bug detection method, device and equipment and computer storage medium
  • Bug detection method, device and equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] Such as figure 1 as shown, figure 1 It is a schematic diagram of the device structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0042] The vulnerability detection device in the embodiment of the present invention may be a PC or a server device on which a Java virtual machine runs.

[0043] Such as figure 1 As shown, the vulnerability detection device may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of Fintech, and discloses a vulnerability detection method, which comprises the following steps of: establishing a test case corresponding to a website interface to be detected, and integrating the test case and a parameter to be detected of the website interface to be detected to obtain a target parameter; obtaining all process events in a website hostaccording to a preset socket netlink and the target parameter, and matching each process event with the test case in sequence; if a target process event matched with the test case exists in the process events, detecting whether a process chain corresponding to the target process event meets a preset condition or not; and if so, determining that the to-be-tested website interface has a vulnerability. The invention further discloses a vulnerability detection device and equipment and a computer storage medium. According to the invention, the vulnerability detection efficiency is improved.

Description

technical field [0001] The present invention relates to the technical field of financial technology (Fintech), in particular to a vulnerability detection method, device, equipment and computer storage medium. Background technique [0002] With the development of computer technology, more and more technologies (big data, distributed, blockchain, artificial intelligence, etc.) The industry's security and real-time requirements also put forward higher requirements for technology. For example, the current common vulnerability detection is only effective for command injection and code execution vulnerability identification of websites with significant status response packets (such as status code, returned page content), but for command injection and code execution without echo, the discovery rate is low , the false positive rate is high, resulting in low detection effect. In addition, the traditional command injection without echo and code execution vulnerability detection use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/033
Inventor 张强
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products