Unlock instant, AI-driven research and patent intelligence for your innovation.

External attack surface visual analysis method and system based on graph technology

A technology, analysis and processing technology, applied in the field of network information security, can solve problems such as unfavorable data mining analysis, large amount of data, and unintuitiveness, etc., and achieve the effect of facilitating in-depth interactive analysis, speeding up understanding, and quickly converging to improve exposure

Pending Publication Date: 2022-07-12
深圳市魔方安全科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This presentation and interaction method cannot well assist security personnel in business scenarios such as rapid attack exposure surface analysis and vulnerability priority determination.
In addition, the data organization and presentation methods of two-dimensional matrices such as tables are not conducive to the mining and analysis of data associations, so there are defects such as large amounts of data, unintuitive and difficult to analyze

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External attack surface visual analysis method and system based on graph technology
  • External attack surface visual analysis method and system based on graph technology
  • External attack surface visual analysis method and system based on graph technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0023] It should be noted that, unless otherwise specified, the technical or scientific terms used in this application should have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0024] Please refer to Figure 1 to Figure 3 , a method for visual analysis of an external attack surface based on a graph technology provided by an embodiment of the present invention, the method includes:

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an external attack surface visual analysis method and system based on a graph technology. The method comprises the following steps: obtaining asset data of internal and external networks and an association mapping relationship corresponding to each asset; analyzing and processing the asset data and the association mapping relation to obtain node information and side information, so as to construct a graph model, and storing the graph model in a graph database; querying a graph database by utilizing predefined high-risk data and combining with a plurality of graph relationship query modes to query corresponding risk data; displaying the risk data to safety personnel in real time by adopting a G6 force-oriented layout through a graph visualization technology so as to realize visual analysis; the method has the beneficial effects that a graph technology is utilized to help a user to carry out rapid carding, so that an external attack surface is more macroscopically presented, in-depth interaction analysis is facilitated, and the understanding, analysis and research and judgment of security personnel on multi-dimensional aggregated information are accelerated, so that the defects of more data, non-intuition and difficulty in analysis of two-dimensional matrixes such as tables and the like are overcome.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method and system for visual analysis of external attack surfaces based on graph technology. Background technique [0002] As one of the important directions for the future development of network security, attack surface management has been paid more and more attention by security teams. The core content of attack surface management is to carry out risk management and control of enterprise assets from an external perspective, so as to achieve comprehensive management of attack surface and reduce the probability of enterprises being attacked in various activities. [0003] At present, there is no standard definition, unified process and analysis method for the "external attack surface". Security vendors in the industry display the organizational structure, business relationship, internal and external assets involved in the external attack surface to security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F16/904G06F16/901
CPCH04L63/20G06F16/9024G06F16/904
Inventor 黄国忠袁帅蓝朝贤
Owner 深圳市魔方安全科技有限公司