Check patentability & draft patents in minutes with Patsnap Eureka AI!

Mimicry intrusion-based vulnerability detection method and system and storage medium thereof

A vulnerability detection and vulnerability technology, applied in the field of electronic communication, can solve problems affecting the normal operation of applications or systems, false positives of vulnerabilities, etc., and achieve the effect of reducing test request information, improving accuracy, and contributing to normal operation.

Active Publication Date: 2021-12-17
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the above-mentioned related technologies, the inventor believes that when detecting known vulnerabilities of applications or systems, it is easy to cause false alarms of vulnerabilities, which affects the normal operation of applications or systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry intrusion-based vulnerability detection method and system and storage medium thereof
  • Mimicry intrusion-based vulnerability detection method and system and storage medium thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-2 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0058] The embodiment of this application discloses a vulnerability detection method based on mimic intrusion, refer to figure 1 , including the following steps:

[0059] S1. Obtain the target type of the detected target.

[0060] Before the step of obtaining the target type of the detected target, it also includes:

[0061] S11. Obtain the feature code of the detected target.

[0062] It should be noted that the detected target may be an application program or a webpage system. Generally, the application program will contain some feature codes more or less in the html, js, css and other files. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mimicry intrusion-based vulnerability detection method and a system and a storage medium thereof. The method comprises the following steps of obtaining a target type of a detected target; loading a corresponding vulnerability detection script based on the target type; obtaining test request information of each vulnerability based on the vulnerability detection script, and performing verification in the detected target according to the test request information to obtain a response result of the corresponding vulnerability; comparing the response result with preset response information, and if the response result is matched with the response information, determining that the vulnerability exists; and based on the determined multiple vulnerabilities, outputting vulnerability types and affected conditions faced by the detected target. According to the target type of the detected target, the vulnerability detection script needing to be tested is determined, so that the obtained test request information is reduced; in addition, in different detected targets, the response results corresponding to the test request information are different, the vulnerability judgment precision can be improved, and normal operation of the detected targets is facilitated.

Description

technical field [0001] The present application relates to the technical field of electronic communication, in particular to a method, system and storage medium for detecting vulnerabilities based on mimicry intrusion. Background technique [0002] With the rapid development of the Internet, the diversified development of computer applications, such as e-mail, online banking, instant messaging and other applications are widely used in all aspects of user life and work, network data security leaks emerge in endlessly, terminal data security protection is urgent . Generally, vulnerability detection can be divided into detection of known vulnerabilities and detection of unknown vulnerabilities. The detection of known vulnerabilities mainly uses security scanning technology to detect whether there are published security vulnerabilities in the system; the purpose of unknown vulnerability detection is to discover possible but undiscovered vulnerabilities in the software system. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55Y02D10/00
Inventor 杨永清
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More