Situation awareness network vulnerability defense method, device and system
A situation awareness and vulnerability technology, applied in the field of network security, can solve the problem of obtaining the attack sequence of the attacker
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0046] see figure 1 Shown is a flowchart provided by the present invention. The implementation step S100 of the method is as follows:
[0047] S101. Perform a vulnerability scanning operation on network nodes and associated network nodes, obtain attack feature information of network vulnerabilities, and determine network vulnerability types of the aforementioned network nodes and associated network nodes according to the aforementioned attack features.
[0048] The network node refers to a terminal in a network environment with an independent network address and data processing functions, and the data processing functions include but not limited to the functions of transmitting data, receiving data and / or analyzing data.
[0049] The network nodes may be workstations, clients, network users, or personal computers, as well as servers, printers, and other network-connected devices. The entire network environment includes multiple network nodes, and these network nodes are conn...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


