Method for verifying vulnerabilities of network devices using CVE entries
A technology of network equipment and entries, applied in the field of security systems, can solve problems such as unspecified CPE, confusion, and difficulty in generating CPE
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] The present invention relates to a method for verifying vulnerabilities of network devices using CVE entries.
[0062] The method according to the present invention can be applied to CVE-based classification of vulnerable IoT systems. The present invention applies to scenarios that require automated methods to process large amounts of data from different sources without relying on human interaction.
[0063] In particular, the present invention is applicable to the field of security methods for automated management of large amounts of software and hardware vulnerability data and reports.
[0064] In the present invention, the term "CVE entry" refers to a record commonly used in various databases or documents to refer to a given vulnerability, such as a vulnerability published by MITRE, with an ID of the form: CVE-yyyy-nnnnn.
[0065] In the present invention, the term "CVE tree" refers to a representation in the form of a tree-like graph of CVE entries provided with no...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


