Vulnerability detection method and system

A vulnerability detection and vulnerability technology, applied in the field of network security, can solve problems such as shortening detection time, low overall efficiency, waste of system resources, etc., to achieve the effect of improving vulnerability detection efficiency, ensuring success rate and speed, and accurate feedback information

Active Publication Date: 2020-11-13
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Both the classification work and the level update work need to be carried out actively by maintenance personnel, and the test environment needs to be updated to reduce the difference between the test environment and the real environment, resulting in low overall efficiency;
[0008] Since the level update is performed regularly and the update interval is long, it cannot meet the ever-changing needs of the current computer technology. Therefore, the detection efficiency of the vulnerability rule base is often significantly reduced during the update cycle, resulting in too long time for each detection and a lot of waste. system resources;
[0009] The update of the vulnerability rules cannot take into account the full performance of the vulnerability rules, which not only does not shorten the detection time after injecting the vulnerability rules in some application scenarios, but also affects the normal operation of the detection object

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and system
  • Vulnerability detection method and system
  • Vulnerability detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Below, specific embodiments of the present application will be described in detail in conjunction with the accompanying drawings, but it is not intended as a limitation of the present application.

[0062] It should be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the following description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the disclosure.

[0063] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and, together with the general description of the disclosure given above and the detailed description of the embodiments given below, serve to explain the embodiments of the disclosure. principle.

[0064] These and other characteristics of the present application will become apparent from the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method and system, and the method comprises the steps: responding to a vulnerability detection request, and determining a to-be-detected object; determining a target vulnerability rule list at least based on the to-be-detected object and the performance score value of each vulnerability rule in a rule base, wherein a plurality of target vulnerability rules are recorded in the target vulnerability rule list; performing vulnerability scanning on the to-be-detected object based on the target vulnerability list; generating feedback information at least based on the scanning result; and updating a performance score value of the target vulnerability rule based on the feedback information. According to the vulnerability detection method, the optimal vulnerability rule can be automatically determined and updated, so that the success rate and speed of each vulnerability detection are ensured.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network security, and in particular to a vulnerability detection method and system. Background technique [0002] Under the environment of rapid development of the Internet, various web (network) applications emerge in an endless stream. These web applications have gradually changed people's daily behavior habits and business processing methods, making the complex and tedious solutions in the past simple and efficient. [0003] But along with it, the network security environment is becoming increasingly severe, and malicious attacks against web applications also occur from time to time. Once a web application in a production environment exposes security problems, it will cause serious damage to users and enterprises using it. The impact is likely to be immeasurable. [0004] Therefore, more and more people turn their attention to web security, hoping that all web applications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55G06F21/57
CPCH04L63/1433G06F21/55G06F21/577
Inventor 刘德森
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products