Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the Internet field, can solve the problems of network system paralysis, low efficiency of manual update, high false negative rate and false positive rate of intrusion detection software, etc., and achieve the effect of efficient detection of vulnerabilities.

Active Publication Date: 2021-10-22
NORTH CHINA ELECTRICAL POWER RES INST +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, intrusion detection software has a high rate of false negatives and false positives, and active scanning will occupy a large amount of server resources, which is not conducive to the normal use of business systems
[0004] In addition, there are also big problems in the traditional way of repairing security vulnerabilities, mainly including manual update by operation and maintenance personnel and unified deployment by desktop management platform
However, when there are a lot of software with security vulnerabilities in the system, the efficiency of manual update will be very low, which is not conducive to the timely repair of vulnerabilities.
The one-click deployment based on the desktop management platform is more convenient when dealing with medium and low-risk vulnerabilities, but for APT attacks that may comprehensively exploit multiple vulnerabilities, it is powerless due to the complexity of the repair, and the security of the desktop management server has also become a problem. The security bottleneck of the whole system
Once the desktop management server is compromised, the entire network system will be paralyzed
[0005] For how to efficiently detect and repair security vulnerabilities, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0052] figure 1 It is a method flowchart of an embodiment of the vulnerability detection method provided by this application. Although the present application provides method operation steps or device structures as shown in the following embodiments or accompanying drawings, more or less operation steps or module units may be included in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method and device.The method comprises the steps that a target node detects security vulnerabilities and generates a vulnerability rectification list; the target node broadcasts the vulnerability rectification list in a block chain subnetwork where the target node is located; the bookkeeping node in the block chain subnet where the target node is located packages the vulnerability rectification list into a block and carries out chain entering operation, and block information after the chain entering operation can be checked by other subnets. According to the scheme, the problem that existing vulnerability detection is low in efficiency is solved, and the technical effect of efficiently detecting vulnerabilities is achieved.

Description

technical field [0001] The present application belongs to the technical field of the Internet, and in particular relates to a vulnerability detection method and device. Background technique [0002] For large enterprises, many business systems are generally deployed on PCs and servers. With the continuous increase of software scale, the types and numbers of software vulnerabilities increase greatly, which brings serious challenges to the software security of business systems. serious threat. [0003] Traditional security vulnerability detection methods mainly include passive defense of intrusion detection software and active scanning of virus killing software. However, intrusion detection software has a high rate of false negatives and false positives, and active scanning will occupy a large amount of server resources, which is not conducive to the normal use of business systems. [0004] In addition, there are also big problems in the traditional way of repairing security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F9/54G06F21/62
CPCG06F21/577G06F9/542G06F21/6227
Inventor 司冠林孙跃李敏张月高冉馨景森徐小天陈威
Owner NORTH CHINA ELECTRICAL POWER RES INST