Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability management system based on network assets

A vulnerability management and network asset technology, applied in the computer field, can solve problems that threaten the normal operation of the company, tampering, information leakage, etc.

Active Publication Date: 2021-05-18
HUANENG POWER INTERNATIONAL +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while network technology brings convenience to people, security issues in various network and asset information systems are gradually exposed. At present, network asset systems mainly rely on manual processing to discover and deal with loopholes. With the increasing complexity of network asset systems , the types of assets are becoming more and more diverse, and system maintenance is becoming more and more difficult. Attackers take advantage of this opportunity to invade the system, tamper with pages and even obtain important asset data, resulting in information leakage and threatening the normal operation of the entire company.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability management system based on network assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] refer to figure 1 , a vulnerability management system based on network assets, based on CPU hardware and network environment, including a vulnerability database module 1, a vulnerability information display module 2, a vulnerability retrieval module 3, an update vulnerability database module 4 and a vulnerability database export module 5.

[0020] The vulnerability information display module 2 is used to display specific vulnerability information under th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability management system based on network assets. The system comprises a vulnerability library module, a vulnerability information display module, a vulnerability retrieval module, a vulnerability library updating module and a vulnerability library exporting module; wherein the vulnerability library module classifies the detected vulnerability information; the vulnerability information display module displays specific vulnerability information under three different classifications of CNNVD, CNVD and CVE; the vulnerability retrieval module performs HTML (Hypertext Markup Language) analysis and arrangement on the screened information; the vulnerability library updating module stores the obtained useful information in a MongoDB database; the increment detection module completes increment update detection; the vulnerability library export module exports vulnerabilities. According to the method, automatic detection is performed on the network assets through the Scrapy framework, so that excessive dependence on manual detection is avoided; and then the network assets are continuously detected, and the vulnerability library is updated in time, so that the hysteresis of the database is effectively avoided, and meanwhile, the vulnerability information is favorably exported from the MongoDB database and is analyzed, and the security threat is solved.

Description

technical field [0001] The invention belongs to the computer field and relates to a vulnerability system, in particular to a network asset-based vulnerability management system. Background technique [0002] With the rapid development of network technology, the combination of computer network and asset information system can realize paperless office and effectively improve work efficiency. However, while network technology brings convenience to people, security issues in various network and asset information systems are gradually exposed. At present, network asset systems mainly rely on manual processing to discover and deal with loopholes. With the increasing complexity of network asset systems , the types of assets are becoming more and more diverse, and system maintenance is becoming more and more difficult. Attackers take advantage of this opportunity to invade the system, tamper with pages and even obtain important asset data, resulting in information leakage and threat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/1433G06F21/577
Inventor 介银娟王文庆毕玉冰陈燕宋润高原英邓楠轶董夏昕崔逸群刘超飞朱博迪杨东杨新民
Owner HUANENG POWER INTERNATIONAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products