Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability detection method and device, equipment and storage medium

A vulnerability detection and vulnerability technology, applied in the network field, can solve the problems that affect the tester's efficiency of application performance testing and the low vulnerability detection accuracy, and achieve the effect of improving vulnerability detection efficiency and high detection accuracy.

Pending Publication Date: 2022-02-15
CHINA CONSTRUCTION BANK
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the prevalence of false positives in various existing vulnerability detection products, the accuracy of vulnerability detection is not high, which affects the efficiency of testers in testing application performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device, equipment and storage medium
  • Vulnerability detection method and device, equipment and storage medium
  • Vulnerability detection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0066] The terms "first", "second" and the like in the description, claims, and above-mentioned drawings of the embodiments of the present application are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability detection method and device, equipment and a storage medium. The method comprises the steps that after a to-be-detected field returned by a target application is received, feature extraction is conducted on the to-be-detected field, a feature vector of the to-be-detected field is obtained, the feature vector is input into a pre-trained vulnerability detection model, and a detection result of the to-be-detected field is obtained, the detection result is used for indicating whether a vulnerability and / or a vulnerability position exists in the to-be-detected field. By adopting the supervised machine learning model to perform vulnerability detection on the to-be-detected field, the detection accuracy is high. In addition, the detection process can assist testers in performing field preliminary screening, and the vulnerability detection efficiency is improved.

Description

technical field [0001] The present application relates to the field of network technology, and in particular to a vulnerability detection method, device, equipment and storage medium. Background technique [0002] Cross-site scripting (cross site scripting, XSS) refers to malicious attackers inserting malicious script codes into web pages (ie, web pages). When users browse the web pages, the script codes embedded in the web pages will be executed, thereby achieving The purpose of maliciously attacking users. [0003] As a typical vulnerability, XSS vulnerability has an important impact on web applications. As an important detection method in web application security testing, fuzz testing can quickly verify a large number of potential security threats. Fuzz testing, also known as "fuzz testing", is a black-box test that mines application security vulnerabilities and detects application robustness. It mainly observes whether the tested application is abnormal by inputting il...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06N3/08G06N20/00
CPCG06F21/577G06F21/562G06N20/00G06N3/08G06N3/084
Inventor 陈福祥阳骁尧邹为陈果夏伟涂耀旭
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products