Internet asset exposure information checking method

An asset information and Internet technology, applied in the field of Internet asset exposure information investigation, can solve problems such as inaccuracy, excessive Internet assets, and incomplete accounts

Pending Publication Date: 2021-06-08
北京华顺信安信息技术有限公司
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For example, the network asset anomaly detection method, system, medium and equipment disclosed by the authorized announcement number CN111339297A, although it can improve the efficiency and accuracy of private network asset anomaly detection, and can be applied to a variety of general detection methods for abnormal threat scenarios , but there are still some problems in the existing Internet asset exposure information screening methods: Internet assets are numerous, large in scale, limited in personnel, and limited in technical means, resulting in incomplete accounts, inaccurate, poor timeliness, weak management and control, and no way to start when notified. We have been looking at the problem from the defensive side, so we propose a method for screening Internet asset exposure information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet asset exposure information checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , the present invention provides a technical solution: a method for checking Internet asset exposure information, comprising the following steps:

[0030] S1. Confirm known clue information;

[0031] S2. Obtain the domain name and Ip list of the enterprise through the association algorithm;

[0032] S3. Use the asset detection tool to detect the domain name and IP obtained in S2;

[0033] S4. Analyze the ports, protocols, and component applications opened by assets.

[0034] In this embodiment, preferably, the known clues of S1 include enterprise domain name, IP and enterprise information keywords.

[0035] In this embodiment, preferably, the association algorithm in S2 includes certificates, sub-domain name blasting, traffic analysis, ICP information, domain name registration information, enterprise name, app and WeChat applet.

[0036] In this embodiment, preferably, the S1 further includes asset identification, the asset identification is used to ide...

Embodiment 2

[0048] see figure 1 , the present invention provides a technical solution: a method for checking Internet asset exposure information, comprising the following steps:

[0049] S1. Confirm known clue information;

[0050] S2. Obtain the domain name and Ip list of the enterprise through the association algorithm;

[0051] S3. Use the asset detection tool to detect the domain name and IP obtained in S2;

[0052] S4. Analyze the ports, protocols, and component applications opened by assets.

[0053] In this embodiment, preferably, the known clues of S1 include enterprise domain name, IP and enterprise information keywords.

[0054]In this embodiment, preferably, the association algorithm in S2 includes certificates, sub-domain name blasting, traffic analysis, ICP information, domain name registration information, enterprise name, app and WeChat applet.

[0055] In this embodiment, preferably, the S1 further includes asset identification, the asset identification is used to iden...

Embodiment 3

[0066] see figure 1 , the present invention provides a technical solution: a method for checking Internet asset exposure information, comprising the following steps:

[0067] S1. Confirm known clue information;

[0068] S2. Obtain the domain name and Ip list of the enterprise through the association algorithm;

[0069] S3. Use the asset detection tool to detect the domain name and IP obtained in S2;

[0070] S4. Analyze the ports, protocols, and component applications opened by assets.

[0071] In this embodiment, preferably, the known clues of S1 include enterprise domain name, IP and enterprise information keywords.

[0072] In this embodiment, preferably, the association algorithm in S2 includes certificates, sub-domain name blasting, traffic analysis, ICP information, domain name registration information, enterprise name, app and WeChat applet.

[0073] In this embodiment, preferably, the S1 further includes asset identification, the asset identification is used to ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internet asset exposure information checking method. The method comprises the following steps: S1, confirming known clue information; s2, obtaining a domain name and an Ip list of an enterprise through an association algorithm; s3, detecting the domain name and the IP obtained in the S2 by using an asset detection tool; and S4, analyzing ports, protocols and component applications of asset opening. The enterprise domain name and Ip list are obtained through association algorithms such as certificates, sub-domain name blasting, flow analysis, ICP information, domain name registration information, enterprise names, app, WeChat applets and the like, then the domain names and the IPs are detected by using an asset detection tool, open ports, protocols and component applications of assets are analyzed, comprehensive exposure surface investigation is carried out on enterprise internet assets. The method can converge the attack surface, reduce the attacked risk, improve the internal management of an enterprise, reduce the notification of a supervised unit, and lay a foundation for the subsequent safety risk assessment and monitoring.

Description

technical field [0001] The invention belongs to the technical field of asset security, and in particular relates to a method for checking Internet asset exposure information. Background technique [0002] As the national Internet financial monitoring department (hereinafter referred to as the national monitoring department) accesses more and more Internet finance (Internet financial peer-to-peer lending platforms) companies, problems with the integrity and authenticity of transaction data have emerged. There are still various problems in this kind of Internet asset exposure information screening method. [0003] For example, the network asset anomaly detection method, system, medium and equipment disclosed by the authorized announcement number CN111339297A, although it can improve the efficiency and accuracy of private network asset anomaly detection, and can be applied to a variety of general detection methods for abnormal threat scenarios , but there are still some proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q10/06G06Q40/00H04L29/06H04L29/12
CPCG06Q10/103G06Q10/0639G06Q40/00H04L63/08H04L61/4511
Inventor 赵武苏兵社
Owner 北京华顺信安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products