Big data analysis-combined digital service vulnerability detection method and server

A vulnerability detection and big data technology, applied in the direction of electrical digital data processing, instruments, character and pattern recognition, etc., can solve the problems of missed detection and false detection

Active Publication Date: 2021-09-14
山东贵和科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the related business service vulnerability detection te...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data analysis-combined digital service vulnerability detection method and server
  • Big data analysis-combined digital service vulnerability detection method and server
  • Big data analysis-combined digital service vulnerability detection method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] Embodiment 1, for each digital interactive service item, obtain the digitalized business interaction data of the digitalized interactive service item recorded by each digitalized business device in the second loophole detection period, and determine the digitalized interactive service item according to the acquired digitalized business interaction data In the business interaction error log in the preset offline business interaction scenario, update the first business status of the digital interactive service item according to the business interaction error log of the digital interactive service item in the preset offline business interaction scenario Business vulnerability classification characteristics of category items.

[0084] In Embodiment 1, the second loophole detection period can be adjusted according to the actual situation. For example, the second loophole detection period can be determined according to the received offline service trigger identifier. On this b...

Embodiment 2

[0085] Embodiment 2, for each digital interactive service item, obtain the business assistant detection record of the digital interactive service item in the third loophole detection period, and update the second business status category of the digital interactive service item according to the acquired business assistant detection record The business vulnerability classification feature of the item; wherein, the business vulnerability detection result of the digital interactive service item is based on the business vulnerability classification feature of the at least one business vulnerability category item and the first business status category item and the second business The business vulnerability classification characteristics of at least one of the status category items are jointly determined.

[0086] In Embodiment 2, the third loophole detection period can be determined according to the activation period of the business assistant software, and the business assistant dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the big data analysis-combined digital service vulnerability detection method and the server disclosed by the invention, the digital interaction service item corresponding to the interaction operation label information in the digital service interaction data uploaded by each digital service device can be determined, so that accurate positioning of the digital interaction service item is realized, and multiple groups of digital service interaction data of the digital interaction service items recorded by each digital service device in the preset vulnerability detection time period are acquired to perfect the collection of the interaction data of the digital interaction service items, in this way, the business vulnerability classification feature of at least one business vulnerability category item of the digital interaction service item can be completely and comprehensively determined based on the information generation time period and the information generation mode in the multiple groups of digital business interaction data, so that the integrity of the business vulnerability detection result of the digital interaction service item is ensured, and the situation that subsequent digital service interaction is abnormal due to missing detection and false detection of individual business vulnerabilities is avoided.

Description

technical field [0001] This application relates to the field of big data and digital technology, in particular to a digital service vulnerability detection method combined with big data analysis and a server. Background technique [0002] Digitalization refers to the collection of data required for daily operations and innovation of enterprises in various industries through various technical means, such as customer experience data of using products or services, market change data, industry trend data, and so on. Combined with big data analysis, digital technology can form analysis results at the level of many data information, thereby improving the operating efficiency of enterprises and creating new business models. Enterprises from all walks of life can discover the areas that can be improved and optimized in operation by digging the value of data through digital means, and develop new business models. [0003] Digital transformation is a high-level transformation based o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/577G06F18/241
Inventor 杨永飞
Owner 山东贵和科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products