Network asset and vulnerability association method and device based on fingerprints

A network asset and fingerprint technology, applied in the field of data security, can solve the problems of low speed, high resource overhead, and low efficiency of network asset and vulnerability association, so as to improve the association speed, avoid the protection mechanism, and realize the effect of fast association query

Pending Publication Date: 2022-07-15
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the above technical problems, the present invention proposes a method and device for associating network assets and vulnerabilities based on fingerprints to solve the technical problem of low efficiency in the association between network assets and vulnerabilities in the prior art. Existing loopholes are verified, the resource overhead is large, and the speed is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset and vulnerability association method and device based on fingerprints
  • Network asset and vulnerability association method and device based on fingerprints
  • Network asset and vulnerability association method and device based on fingerprints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the corresponding drawings. Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0042] first combine figure 1 The description is a flowchart of a method for associating a fingerprint-based network asset with a vulnerability according to an embodiment of the present invention. like figure 1 As shown, the method includes the following steps:

[0043] Step S1: Detect network assets, and obtain the return message of the network asset; parse the key i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fingerprint-based network asset and vulnerability association method and device, and the method comprises the steps: carrying out the detection of a network asset, and obtaining a return message of the network asset; generating a network asset CPE fingerprint; establishing association between the extracted CPE information and the CVE number; the obtained corresponding relation between the CPE and the CVE is stored in a CPE-CVE association database; the data in the CPE-CVE association database is stored in a CPE-CVE cache database; and querying the cache database based on a time value, if the network asset CPE fingerprint is matched with the fingerprint in the CPE-CVE cache database, adding a corresponding CVE number to the network asset identified by the network asset CPE fingerprint, and storing the network asset in a network asset database. According to the scheme of the invention, the real-time performance and accuracy of association are improved; rapid association query of asset vulnerabilities can be realized, and the query speed is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a fingerprint-based method and device for associating network assets and vulnerabilities. Background technique [0002] A specific vulnerability will affect one or more products and their versions. After common vulnerabilities are exposed, a verification Poc can be written for the details of the vulnerability. This Poc can be used to remotely verify whether the system under test has corresponding vulnerabilities. However, there are many limitations in this step. For example, it needs to interact with the peer server, it is easy to be traced, and the large-scale verification system resources are expensive. [0003] At present, network assets are abundant, and there are more and more network asset detection platforms, such as Shodan, ZoomEye, and Fofa. middle. These platforms will process the detected data before storing the detected assets. One of the steps is to associate the asset...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/32G06F16/951G06F16/242G06F16/23G06F16/2455G06F16/28G06F40/205G06F40/242G06K9/62
CPCG06F21/577G06F21/32G06F16/951G06F16/23G06F40/205G06F40/242G06F16/284G06F16/2455G06F16/242G06F18/24
Inventor 施凡郑敬华开少锋胡淼许成喜沈毅
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products