Component dependency relationship analysis method and system based on graph database
A dependency and analysis method technology, applied in the graph database-based component dependency analysis method and system field, can solve the problem of difficult discovery, management and analysis of component assets and component asset dependency chain security
Pending Publication Date: 2022-07-22
深圳市魔方安全科技有限公司
View PDF0 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
[0004] Aiming at the deficiencies in the prior art, the present invention provides a graph database-based component dependency analysis method and system, which solves the problem in the prior art that it is difficult to discover, manage and analyze the security issues of component assets and component asset dependency chains
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment
[0055] A graph database-based component dependency analysis method, see figure 1 ,include:
[0056] S1: Get multiple service files of the target object;
[0057] S2: Extract multiple components in each service file separately;
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention provides a graph database-based component dependency relationship analysis method and system. The method comprises the following steps of: obtaining a plurality of service files of a target object; respectively extracting a plurality of components in each service file; performing vulnerability detection on the target object to obtain vulnerabilities of the target object; constructing a graph model in the graph database, and importing the components and the vulnerabilities into the graph database; and receiving a query instruction containing the known vulnerability, and querying the graph database according to the query instruction to obtain a query result. According to the method, the concept of a graph is introduced for component management, and the problem that the security problems of component assets and component asset dependency chains are difficult to find, manage and analyze is effectively solved by combining various components and component dependency discovery and enrichment technologies.
Description
technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a method and system for analyzing component dependencies based on a graph database. Background technique [0002] A component mainly refers to an object entity that can complete some functional services and provide external functional services in a certain form (providing an interface or providing a running environment, etc.). Common manifestations include libraries, packages, web servers, frameworks and applications. Wait. Any kind of network service and application today can be understood as a more powerful set of components composed of multiple components with different basic functions through one or more association relationships. The promotion of this component concept greatly facilitates the development of various network services and applications. Developers do not need to repeatedly develop basic functional components, but only need to pu...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/41G06F8/71G06F21/57G06F16/36
CPCG06F8/433G06F8/71G06F21/577G06F16/367
Inventor 黄国忠袁帅蓝朝贤
Owner 深圳市魔方安全科技有限公司



