Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automated penetration testing and data forensics system for multi-type systems

A technology of penetration testing and office automation, applied in the field of network security, can solve the problems of time-consuming and laborious, dependence, and expensive penetration testing, achieve complete technical support, efficient service, and improve the efficiency of penetration testing and data forensics.

Active Publication Date: 2022-04-15
北京凌云信安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. It relies heavily on the ability and experience of penetration test engineers, which is time-consuming and labor-intensive;
[0005] 2. The granularity of manual analysis is too coarse, and there is no effective and comprehensive penetration tool;
[0006] 3. There is no comprehensive and detailed security vulnerability reinforcement mechanism, and experience and knowledge cannot be accumulated and passed on;
[0007] 4. It is not easy to obtain evidence and trace the source of attack events, and there is a lack of standard normative guidance and operational guidance;
[0008] 5. Penetration testing is an expensive service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated penetration testing and data forensics system for multi-type systems
  • Automated penetration testing and data forensics system for multi-type systems
  • Automated penetration testing and data forensics system for multi-type systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of the present invention are described in detail below, and examples of the embodiments are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0038] Such as figure 2 As shown, the automated penetration testing and data forensics system for multi-type systems in the embodiment of the present invention includes: a management and control layer, a scheduling layer, a resource layer, and a basic layer, wherein the management and control layer manages the resource scheduling of the scheduling layer; the scheduling layer Call each subsystem of the resource layer through the interface to perform penetration detection on each target object. Specifically, the contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes an automated penetration testing and data forensics system oriented to multiple types of systems, including: a management and control layer, a scheduling layer, a resource layer, and a basic layer, wherein the management and control layer manages the resource scheduling of the scheduling layer; the scheduling layer through the interface Call each subsystem of the resource layer to perform penetration detection on each target object; the management and control layer is used to perform task control, process control and resource management; the scheduling layer is used to perform tool scheduling, tool driving, data collection and data analysis; the resource layer Including: computer network penetration utilization module, WiFi network penetration utilization module, cloud platform and big data component penetration utilization module, video surveillance equipment penetration utilization module, office automation equipment penetration utilization module, industrial control equipment and Internet of Things penetration utilization module, statistical report management Module; the base layer provides hardware support for the entire platform.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an automatic penetration test and data evidence collection system for multi-type systems. Background technique [0002] Since 2013, the average annual growth rate of the number of security vulnerabilities included in the National Information Security Vulnerability Sharing Platform (CNVD) has been 21.6%, but the number of security vulnerabilities included in 2017 has increased by 47.4% compared with 2016, reaching 15,955. reached an all-time high. Among them, the number of high-risk vulnerabilities recorded reached 5,615 (accounting for 35.2%), a year-on-year increase of 35.4%. There were 3,854 "zero-day" vulnerabilities (24.2%), an increase of 75.0% year-on-year. [0003] The development of the Internet has also brought new ways of information sharing, making some attack tools and attack methods spread rapidly on the Internet, resulting in a large number of network sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/1433H04L63/1416
Inventor 余精彩
Owner 北京凌云信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products