Vulnerability checking method and system based on asset scene attributes
An asset and vulnerability technology, applied in transmission systems, platform integrity maintenance, instruments, etc., can solve the problems of low scanning time efficiency and high vulnerability false positive rate, and achieve the goal of overcoming low scanning time efficiency and high vulnerability false positive rate. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] An embodiment of the present invention provides a method for troubleshooting vulnerabilities based on asset scene attributes, such as figure 1 shown, including the following steps:
[0039] Step S1: Obtain an asset target to be scanned.
[0040] In the embodiment of the present invention, the information of the asset target can be obtained by scanning the IP address of the asset device. This is only an example and not limited thereto. In practical applications, the information of the corresponding asset target can be obtained according to actual needs.
[0041]Step S2: Screen out the surviving asset targets by comparing the asset table with the asset targets to be scanned.
[0042] In the embodiment of the present invention, the fingerprint information of each asset device is included in the asset table, and the fingerprint information includes: asset IP, operating system type, network equipment manufacturer information, database information, application software versi...
Embodiment 2
[0058] The embodiment of the present invention provides a vulnerability checking system based on asset scene attributes, such as image 3 shown, including:
[0059] The target acquisition module 1 is used to acquire the asset target to be scanned; this module executes the method described in step S1 in Embodiment 1, which will not be repeated here.
[0060] The asset identification module 2 is used to filter out the surviving asset objects through the comparison result between the asset table and the asset objects to be scanned; this module executes the method described in step S2 in Embodiment 1, which will not be repeated here.
[0061] The asset table parsing module 3 is used to extract the basic asset information of the surviving asset objects in the asset table; this module executes the method described in step S3 in Embodiment 1, which will not be repeated here.
[0062] The vulnerability library and vulnerability matching strategy module 4 is used to load the correspon...
Embodiment 3
[0066] An embodiment of the present invention provides a terminal, such as Figure 4 As shown, it includes: at least one processor 401 , such as a CPU (Central Processing Unit, central processing unit), at least one communication interface 403 , memory 404 , and at least one communication bus 402 . Wherein, the communication bus 402 is used to realize connection and communication between these components. Wherein, the communication interface 403 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 403 may also include a standard wired interface and a wireless interface. The memory 404 may be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 404 may also be at least one storage device located away from the aforementioned processor 401 . Wherein, the processor 401 may execute the vulnerabilit...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


