HTTP vulnerability scanning host confirmation method and device, equipment and medium
A vulnerability scanning and host technology, applied in the field of system management, can solve problems such as difficulty in accurate identification, low efficiency, and waste of human resources, and achieve the effect of improving the efficiency of confirmation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0054] It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.
[0055] The main solution of the embodiment of the present invention is: invoking a preset mirroring device to continuously audit HTTP traffic data initiated by the host to obtain each HTTP log; from each HTTP log, extracting HTTP sensitive logs that meet preset conditions; Analyze the HTTP sensitive log to confirm whether the host uses HTTP for vulnerability scanning.
[0056] At present, scanning dictionary matching can only identify known scanning tools, and it takes a lot of manpower to analyze and extract the scanning dictionaries used by each tool, which has poor generalization ability. In addition, matching based on sensitive paths can only identify known vulnerabilities. Or backdoor-related access paths, and even normal access may trigger sensitive paths, which are prone to false positives. Therefore, the existi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap