Extensible network security vulnerability monitoring method and system, terminal and storage medium

A network security and vulnerability technology, applied in the field of network security, can solve the problems of being restricted, unable to adapt to the network environment, and lack of scalable design, and achieve the effect of enhancing protection performance, reliable design principle, and wide application prospects.

Active Publication Date: 2021-04-30
BINZHOU POWER SUPPLY COMPANY OF STATE GRID SHANDONG ELECTRIC POWER +1
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing vulnerability scanning network security devices are restricted by the intranet environment, and cannot update the scanning template in time
At the same time, because the equipment does not have a scalable design, it is impossible to manually write automated monitoring scripts, and it is impossible to give full play to th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extensible network security vulnerability monitoring method and system, terminal and storage medium
  • Extensible network security vulnerability monitoring method and system, terminal and storage medium
  • Extensible network security vulnerability monitoring method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0046] figure 1 is a schematic flowchart of a method in one embodiment of the present invention. in, figure 1 The executive body can be an extensible network security vulnerability monitoring system.

[0047] Such as figure 1 As shown, the method 100 includes:

[0048] Step 110, saving the detection script imported by the user to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an extensible network security vulnerability monitoring method and system, a terminal and a storage medium, and the method comprises the steps: storing a detection script imported by a user in a script library, executing a newly-added script of the script library, and formulating a filtering rule according to an execution result; storing the filtering rule, the vulnerability type corresponding to the filtering rule and the attack effect of the corresponding vulnerability type into a rule base; calling a filtering rule in the rule base to detect the target data; and if it is detected that the target data has the vulnerability, outputting a corresponding vulnerability type and an attack effect according to a filtering rule for detecting the target data. The invention is based on an active vulnerability detection model, extensible design is achieved, multi-language writing of vulnerability detection programs is supported, the method can be reused by similar vulnerabilities, autonomous early warning can be achieved after the vulnerabilities are found, and the vulnerability mining and repairing capacity of staff is brought into full play.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an expandable network security loophole monitoring method, system, terminal and storage medium. Background technique [0002] In recent years, attacks on computer network information systems in the electric power industry and the resulting information security incidents have shown a rapid growth trend, and have been highly valued by the electric power industry. [0003] In order to improve the network security of the power industry, network security equipment such as vulnerability scanning equipment, audit equipment, and Internet behavior management are arranged in the network system. However, existing vulnerability scanning network security devices are limited by the intranet environment and cannot update the scanning template in time. At the same time, because the equipment does not have a scalable design, it is impossible to manually write automated monitoring script...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433
Inventor 黄华杜宁宁李蓬潘志鹏付云磊周伟左长华范康康于彦兵盖凯凯
Owner BINZHOU POWER SUPPLY COMPANY OF STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products