Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method and system based on attack surface

A vulnerability detection and vulnerability technology, which is applied in the field of vulnerability detection based on attack surface, and can solve problems such as morphological analysis which is different from network attack morphological analysis.

Active Publication Date: 2020-11-27
武汉思普崚技术有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for vulnerability detection based on the attack surface. By transforming the existing attack surface analysis method, the traffic of different network slices is integrated, and the multi-dimensional feature set is extracted according to the identification information, and sent to the machine learning model for detection. , and according to the type of abnormal feature set, targeted traceability can solve the problem of network slicing in the existing attack surface analysis; the vulnerability point is obtained through traceability, and the morphological analysis of the modification of the vulnerability infection surface can be realized. Deploy defense strategies to solve the problem that the morphological analysis of vulnerabilities is different from the morphological analysis of network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and system based on attack surface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the protection scope of the present invention can be more clearly defined.

[0032] figure 1 The general flow chart of the attack surface-based vulnerability detection method provided for this application, the method includes:

[0033] Statically detect multiple first flows of a network function virtualization-based communication network, where the first flows are flows belonging to different network slices;

[0034] Receive multiple access requests carrying network slice identifiers, determine the source node corresponding to the network slice to be accessed according to the network slice identifier, and obtain from the source node the context information of the multiple first flows, respectively, extracting all identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method and system based on an attack surface. By modifying an existing attack surface analysis method, integrating flows of different network slices, extracting a multi-dimensional feature set according to identification information, sending the multi-dimensional feature set to a machine learning model for detection and performing targeted tracing according to the type of an abnormal feature set, the problem of network slicing in existing attack surface analysis is solved; and vulnerability points are obtained through tracing, and morphologicalanalysis of transformation is performed on vulnerability infection surfaces, so that defense strategies can be dynamically deployed on key nodes, and the problem that the morphological analysis of vulnerabilities is different from the morphological analysis of network attacks is solved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a method and system for vulnerability detection based on an attack surface. Background technique [0002] With the rapid development of network technology, security vulnerabilities emerge in an endless stream, and more and more network nodes make the detection of vulnerabilities more and more difficult, and it is even more difficult to trace the development of vulnerabilities according to the conventional propagation path. . [0003] The existing attack surface analysis methods can solve the problems of concealment, fragmentation and correlation to a certain extent, but there are still problems such as network slicing, and the morphological analysis of vulnerabilities is different from the morphological analysis of network attacks. There is an urgent need for a targeted attack surface-based vulnerability detection method and system. SUMMARY OF THE INVEN...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/57G06N20/00
CPCG06F21/577G06N20/00H04L63/1416H04L63/1425H04L63/1433
Inventor 段彬
Owner 武汉思普崚技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More