CN106815229A - Database virtual patch means of defence - Google Patents

Database virtual patch means of defence Download PDF

Info

Publication number
CN106815229A
CN106815229A CN201510852161.8A CN201510852161A CN106815229A CN 106815229 A CN106815229 A CN 106815229A CN 201510852161 A CN201510852161 A CN 201510852161A CN 106815229 A CN106815229 A CN 106815229A
Authority
CN
China
Prior art keywords
function
database
patch
condition
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510852161.8A
Other languages
Chinese (zh)
Inventor
孟宪哲
毛俐旻
王润高
曾淑娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN201510852161.8A priority Critical patent/CN106815229A/en
Publication of CN106815229A publication Critical patent/CN106815229A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of database virtual patch means of defence, including:Receive the patch information of database manufacturer issue;Machine instruction conversed analysis are carried out to the database before and after patch installing, by the binary machine instruction in executable file, by being inversely reduced to assembler language code;Assembler language code is analyzed, it is expressed as mutual call relation between different function and functions, one binary file is converted to a digraph, call relation and control flow graph after analysis obtains binary file dis-assembling, by calculating basic number of blocks in controlling stream graph, redirecting side number and calling other function numbers, and generate the signature of the function;Function, according to pairing function and non-matching function, is checked as pairing by non-matching function according to function signature, positioning triggers the code of security breaches;The code of the initiation security breaches based on vulnerability information and positioning produces effective attack graph, carries out virtual patch protection rule and builds.

Description

Database virtual patch means of defence
Technical field
It is a kind of database virtual patch means of defence the invention belongs to database security field.
Background technology
Database Systems are the basic platforms in information system, many government organs, military service, In the key service system of enterprise-like corporation all data storage storehouses, if database security cannot be protected Card, application system thereon also can be by unauthorized access or destruction.Although current ripe commercial number All there is the security functions such as authentication, access control, audit according to library management system, be number Certain safety guarantee is safely provided according to storehouse, but has also been existed in terms of database security following Problem:
1. database leak is presented and is on the increase situation.As user is to data base management system work( The lifting of energy demand, the scale of data base management system becomes more and more huger, data base administration The risk that security breaches occurs in system is being continuously increased, and such as these leaks are ignored, data Storehouse faces the risk that core data is compromised.
2. careless upgrade database may cause using abnormal.Database upgrade, patch installing need The multi-party cooperations such as DBA, application system keeper, if not taking into full account database Possible caused system change during upgrading, patch installing, then having after Database Systems upgrading can Can cause to apply normally to use.
3. database patch cannot prevent default back door." prism door " event exposes foreign countries The severe compromise that commercial database system is present, foreign database manufacturer, intelligence department can Using the back door of data base management system itself, the data in database are monitored and stolen Take, back door is prefixed during design of database system, attached security mechanism thereon is just Perform practically no function.
Therefore, DBA is faced with such predicament:Database leak benefit, The risk of influence application is plugged a hole and faced, but all cannot fundamentally take precautions against data in any case The helpless situation at storehouse back door.
The content of the invention
It is an object of the invention to provide a kind of database virtual patch means of defence, for solving Above-mentioned problem of the prior art.
Database virtual patch means of defence of the invention, wherein, including:Receive database factory The patch information of business's issue;Machine instruction conversed analysis are carried out to the database before and after patch installing, By the binary machine instruction in executable file, by being inversely reduced to assembler language code; Assembler language code is analyzed, is between different function and functions by whole program representation Mutual call relation, is converted to a digraph, by analyzing by a binary file Call relation and control flow graph after to binary file dis-assembling, by calculating controlling stream Basic number of blocks in figure, redirect side number and call other function numbers, and generate the function Signature, the signature of the function corresponds to basic number of blocks, redirects side number and calls other functions Number;According to function signature to function as pairing, according to pairing function and non-matching function, lead to Cross and non-matching function is checked, positioning triggers the code of security breaches;Based on vulnerability information And the code of the initiation security breaches of positioning produces effective attack graph, carry out virtual patch and prevent Shield rule builds.
One embodiment of database virtual patch means of defence of the invention, wherein, according to Function signature chooses same or analogous function to be included as the condition of pairing:Meet condition (1), Meet condition (2) or condition (3) simultaneously:Enter carrying out two before and after database patch installing respectively After system is reverse, then piecemeal, n function is formed, the piecemeal result before patch installing is function set, Piecemeal result after patch installing is function set;Condition (1):There is first function and belong to dozen benefit , there is the function set after second function belongs to patch installing, and the first letter in the function set before fourth Number is identical with second function signature;Condition (2):Collection of functions in condition (1) before patch installing It is identical with second function signature in the absence of other function signatures outside first function in conjunction;Condition (3):In function set in condition (1) after patch installing, in the absence of its outside second function His function signature is identical with first function signature;;Condition (1) is met, while meeting condition (2) Or the function of condition (3) is pairing function, is checked by non-matching function, position Trigger the code of security breaches.
One embodiment of database virtual patch means of defence of the invention, wherein, it is based on Vulnerability information produces effective attack graph, and carrying out virtual patch protection rule structure includes:To open Put vulnerability scan and the vulnerability information obtained according to the code of the initiation security breaches of positioning Based on set up leak knowledge base;The target environment information of database is pre-processed, by ring Environment information is classified according to predicate title, attribute, forms multiple sub-goal context terms;By mesh Mark environment storage is in a tree form data structure;According to target environment by leak knowledge base Attack mode is instantiated as attack graph.
One embodiment of database virtual patch means of defence of the invention, wherein, the tree Graphic data structure includes 4 node layers:Root node, host address node, predicate name node with And attribute node.
To sum up, what the Vulnerability Management repair process during the present invention is protected for solution database was faced Various problems, it is proposed that a kind of database virtual patch means of defence has advantages below:
1. the official's patch that can be issued with the database leak of CVE issues, database manufacturer is believed Breath is foundation, analyzes the mechanism of production of leak, grasps vulnerability exploit mechanism and reduces corresponding attacking Blow mode;
2. attack path can be modeled, and realized database access behavior pattern With the Rapid matching of model;
3. specific behavior pattern can be blocked according to preset rules, reaching prevents number The effect attacked according to storehouse.
Brief description of the drawings
Fig. 1 show database virtual patch protection module figure of the present invention;
Fig. 2 show database virtual patch protection module workflow diagram;
Fig. 3 show the comparative analysis flow chart of the database before and after patch installing;
Fig. 4 show the function structure figure of database;
Fig. 5 show the subfunction controlling stream graph of function;
Fig. 6 show the flow chart of attacking analysis;
Fig. 7 show the data structure diagram of target environment information.
Specific embodiment
It is below in conjunction with the accompanying drawings and real to make the purpose of the present invention, content and advantage clearer Example is applied, specific embodiment of the invention is described in further detail.
Fig. 1 show database virtual patch protection module figure of the present invention, as shown in figure 1, data Storehouse virtual patch protection module includes:Protocol resolution module 1, access behavior filtering module 2, please Ask forwarding module 3, rule base 4, attack analysis module 5, regular typing module 6, attack point Analysis module 7, Patches analysis module 8 and Configuration Manager 9.
With reference to Fig. 1, protocol resolution module 1 is used to carry out database server mapping and database Protocol analysis etc..Access behavior filtering module 2 is used to carry out to the SQL statement in access request Reduction, and rule-based storehouse characterization rules, database access request is filtered, shield Attack and user-defined exception and misuse behavior for database leak.Request forwarding Module 3 is used for the functions such as request restructuring and forwarding that conduct interviews.Patches analysis module 8 is used for number The patch information issued according to storehouse manufacturer is input, the corresponding database defect code of positioning patch. Attack analysis module 7 is used for the knot of vulnerability information or Patches analysis based on authoritative vulnerability database issue Really, the Land use systems of analyzing defect code, obtain corresponding attack mode, and be abstracted into access The regular typing rule base 4 of control.Regular typing module 6 is used for according to demand, by User Defined Access regular typing rule base 4.Configuration Manager 9 is used to protect mould to database virtual patch The operational factor of block is configured, recording equipment running log and audit log information.Rule base 4 are used to deposit the Rule Informations such as all kinds of vulnerability exploit patterns, attack mode and abnormal patterns.
Fig. 2 show database virtual patch protection module workflow diagram, with reference to Fig. 1 and figure 2, database virtual patch means of defence mainly includes:
1. patch information input database virtual patch protection module database manufacturer issued;
2. by patch comparative analysis method, patch information is analyzed, positioning patch correspondence Leak mechanism;
3. attacked according to the leak mechanism that obtains of analysis or by the leak reduction of the direct issue such as CVE Mode is hit, and carries out attacking analysis;
4. database protection rule is generated according to attack path model, target database is prevented Shield.
Fig. 3 show the comparative analysis flow chart of the database before and after patch installing, and Fig. 4 show number According to the function structure figure in storehouse, Fig. 5 show the subfunction controlling stream graph of function, for the present invention Database virtual patch means of defence specifically implements profit, including:
Receive the patch information 11 of database manufacturer issue;
Machine instruction conversed analysis are carried out to the database 14 before and after patch installing, by executable file In binary machine instruction, by being inversely reduced to assembler language code;
Assembly code is analyzed, is between different function and functions by whole program representation Mutual call relation, is converted to a digraph, as shown in Figure 3 by a binary file; Call relation and control flow graph after analysis obtains binary file dis-assembling, such as scheme Shown in 4;By calculating basic number of blocks in controlling stream graph, each basic block is the son of a function The quantity of the basic block a-g in function such as function A is 6, as shown in Figure 4;Side number is redirected, 7 are co-existed between call relation sum between i.e. each subfunction, such as basic block a-g call pass System, as shown in Figure 4;And call other function numbers, such as called not in function A Belong to the quantity of the function of function A.And generate the signature of the function.A three-dimensional can be used Vectorial S (i)=(α i, β i, γ i) as function signature, wherein, α i, represent correspondence controlling stream graph in base This block number;β i represent correspondence controlling stream graph in side number, single function call and be called time Number;γ i represent that this calls other function numbers.
Possible same or analogous function is chosen as pairing according to function signature, successively to each The basic block that the function pair matched somebody with somebody carries out inside is compared, and determines function similarity.Judge in the present invention It refers to while meeting condition (1), and meet condition (2) that function ai, bj have unique same signature Or condition (3):
To respectively be carried out before and after database patch installing binary system it is reverse after, then piecemeal forms n Function, the piecemeal result before patch installing is function set (a1 ... .an), the piecemeal after patch installing Result is function set (b1 ... ..bn).
Condition (1):Existence function ai and bj belong to 2 function sets before and after patch respectively, and Both signatures are identical;
Condition (2):In function set where existence function ai, in the absence of other function signatures It is identical with bj signatures;
Condition (3):In function set where existence function bj, in the absence of other function signatures It is identical with ai signatures.
Binary executable before and after patch can be divided into two classes after comparison:With only One same signature pairing function and non-matching function, check, i.e., by non-matching function The code for triggering security breaches can be positioned, and fragility table note is carried out to non-matching function.
Patch comparison method be by contrasting the difference before and after patch installing between executable file, it is fast Speed positioning defect code, reduces in order to leak mechanism analysis and attack path.Due to being compiled The influence of the various aspects such as device optimization, logical address is translated, byte comparison is carried out to database patch, Or simple text comparison is carried out to dis-assembling assembly code out, cannot all obtain well Effect.To solve the problem, using structuring way of contrast, by extracting dis-assembling code in Function signature, with Compilation function be basic research unit carry out comparison work.
Patch correlation technique basic ideas of the invention are:Extracting before and after patch can letter in database Several symbolic characteristic information are compared as function signature to function signature;With only The function of one same signature is after pairing, it is considered to be identical.
Method is substantially that whole database is considered as into a figure, using function as binary file One " subgraph ", a structure chart, two binary system texts are translated into by whole binary file The comparison of part also translates into the comparing between two figures, compares the signature between two functions. The structural comparison method of binary file considers file content, two sections of identical generations from structural level In the case of the possible difference of content of text, its structure would generally keep one to the file of code generation Cause.
Fig. 6 show the flow chart of attacking analysis, with reference to Fig. 1 and Fig. 6, is obtained according to analysis Leak mechanism or the leak directly issued by CVE etc. reduce attack pattern, and carry out attack and build Mould, including:
Effective attack graph, and then the regular structure of virtual patch protection are produced based on vulnerability information 12 Build, leak can be modeled by the way of logic-based and analyze and generate attack graph, And then acquisition of the realization to attack mode.
Using attacking drawing method and carry out vulnerability exploit pattern analysis and can clearly describe attacker's Track is attacked, is readily appreciated and correlative protection Rulemaking, but because database is related to attack Hit face widely, general attack graph construction method is easily trapped into the problem of state explosion.It is solution Certainly the problem, target environment preconditioning technique is increased in the attack map analysis that can be used, and is subtracted It is few to it is non-should not, the search of unreachable target of attack environment attribute, greatly improve attack graph point Analysis performance.Attack graph engine, with reference to attack database, enters to target environment information data structure Row traversal, searching illegally reaches another node with a starting point.
Fig. 7 show target environment information data structure figure, with reference to Fig. 7, target environment Information Number Include according to structural attacks modeling:
1. knowledge base is built.With the authoritative institutions such as CVE issue open vulnerability scan and by Leak is set up based on the vulnerability information that the patch information analysis of database manufacturer issue is obtained to know Know storehouse, leak knowledge base provides inference rule for attack graph generation.
2. target environment pretreatment.By database related host information, information on services, configuration The target environment information such as information is pre-processed, by environmental information according to predicate title (offer COS), attribute classified, form some sub-goal context terms.What the present invention was used Target environment Preprocessing Algorithm stores in a tree form data structure target environment, such as Fig. 7 The shown tree includes 4 node layers:Root node, host address node, predicate name node, category Property node.
Target environment is described as follows in Preprocessing Algorithm:
Input:The Tree of attribute in storage target environment;Initial category in target environment set Property f
Output:Tree after insertion attribute f
I=IPValue (f);
P=PredicateName (f);
If Node(I)S-Nodes(Tree.Root)Then
S-Nodes (Tree.Root)=S-Nodes (Tree.Root) ∪ { Node (I) };
S-Nodes (Node (I))=S-Nodes (Node (I)) ∪ { Node (P) };
S-Nodes (Node (P))={ Node (f) };
Else If Node(P)S-Nodes(Node(I))Then
S-Nodes (Node (I))=S-Nodes (Node (I)) ∪ { Node (P) };
S-Nodes (Node (P))={ Node (f) };
Else If Node(f)S-Nodes(Node(P))Then
S-Nodes (Node (P))=S-Nodes (Node (P)) ∪ { Node (f) };
Return Tree
During the input of the algorithm in the Tree and target environment set of storage target environment attribute Initial attribute f, is output as inserting the Tree after attribute f, and the effect of the algorithm is to close by attribute f In suitable position insertion tree Tree.Algorithm first determines whether the parameter value of the HostID types of attribute f Whether mark (the i.e. mark of second node layer of certain descendant node of the root node of Tree is equal to Know), do not exist such as, then the section of the parameter value mark of HostID type of the generation with attribute f Point i, used as the descendant node of root node, then generation has the predicate name identification of attribute f Node j, as the descendant node of node i, then using attribute f as node j descendant node; If the parameter of the HostID types of attribute f is equal to certain descendant node of the root node of Tree The mark of k, then whether be equal to certain follow-up section of node k in the predicate title for judging attribute f The mark of point, if it does not exist, then the node m of predicate name identification of the generation with attribute f, As the descendant node of node k, if there is such descendant node n, then just by the attribute F as node n descendant node.
3. attack graph is constructed.By target environment and leak knowledge base input attack graph construction engine, Attack mode in leak knowledge base is instantiated as by attack graph according to target environment.
To sum up, database virtual patch means of defence of the invention, can be with issues such as CVE Official's database vulnerability information and the patch information of database manufacturer issue are virtual according to generation Patch, virtual patch in database side without being disposed, it is only necessary to is deployed in a transparent way Fly on database virtual patch protection module before being serially connected in database server to be protected, i.e., The monitoring to database access behavior is capable of achieving, is found and is blocked using database leak, back door Or the behavior of database information is illegally obtained using supervisor privilege, realization is changed to database zero Under the conditions of to database leak, the closure at back door.
The main effect realized of the invention includes:
1. the official's patch that can be issued with the database leak of CVE issues, database manufacturer is believed Breath is foundation, analyzes the mechanism of production of leak, grasps vulnerability exploit mechanism and reduces corresponding attacking Blow mode;
2. attack path can be modeled, and realized database access behavior pattern With the Rapid matching of model;
3. specific behavior pattern can be blocked according to preset rules, reaching prevents number The effect attacked according to storehouse.
The above is only the preferred embodiment of the present invention, it is noted that led for this technology For the those of ordinary skill in domain, on the premise of the technology of the present invention principle is not departed from, can be with Some improvement and deformation are made, these are improved and deformation also should be regarded as protection scope of the present invention.

Claims (4)

1. a kind of database virtual patch means of defence, it is characterised in that including:
Receive the patch information of database manufacturer issue;
Machine instruction conversed analysis are carried out to the database before and after patch installing, by executable file Binary machine instruction, by being inversely reduced to assembler language code;
Assembler language code is analyzed, is different functions and function by whole program representation Between mutually call relation, a binary file is converted to a digraph, by point Analysis obtains call relation and control flow graph after binary file dis-assembling, is controlled by calculating Basic number of blocks in flow graph processed, redirect side number and call other function numbers, and generate the letter Several signatures, the signature of the function corresponds to basic number of blocks, redirects side number and call other letters Several numbers;
According to function signature to function as pairing, according to pairing function and non-matching function, lead to Cross and non-matching function is checked, positioning triggers the code of security breaches;
The code of the initiation security breaches based on vulnerability information and positioning produces effective attack Figure, carries out virtual patch protection rule and builds.
2. database virtual patch means of defence as claimed in claim 1, it is characterised in that Choose same or analogous function according to function signature includes as the condition of pairing:Meet condition (1), while meeting condition (2) or condition (3):
To respectively be carried out before and after database patch installing binary system it is reverse after, then piecemeal forms n Function, the piecemeal result before patch installing is function set, and the piecemeal result after patch installing is function Set;
Condition (1):There is the function set before first function belongs to patch installing, there is the second letter Number belongs to the function set after patch installing, and first function is identical with second function signature;
Condition (2):In function set in condition (1) before patch installing, in the absence of the first letter Other function signatures outside number are identical with second function signature;
Condition (3):In function set in condition (1) after patch installing, in the absence of the second letter Other function signatures outside number are identical with first function signature;;
Condition (1) is met, while it is pairing letter to meet the function of condition (2) or condition (3) Number, checks by non-matching function, and positioning triggers the code of security breaches.
3. database virtual patch means of defence as claimed in claim 1, it is characterised in that Effective attack graph is produced based on vulnerability information, carrying out virtual patch protection rule structure includes:
To open vulnerability scan and be obtained according to the code of the initiation security breaches of positioning Leak knowledge base is set up based on vulnerability information;
The target environment information of database is pre-processed, by environmental information according to predicate name Claim, attribute is classified, form multiple sub-goal context terms;
By target environment storage in a tree form data structure;
Attack mode in leak knowledge base is instantiated as by attack graph according to target environment.
4. database virtual patch means of defence as claimed in claim 1, it is characterised in that The tree form data structure includes 4 node layers:Root node, host address node, predicate title section Point and attribute node.
CN201510852161.8A 2015-11-30 2015-11-30 Database virtual patch means of defence Pending CN106815229A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510852161.8A CN106815229A (en) 2015-11-30 2015-11-30 Database virtual patch means of defence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510852161.8A CN106815229A (en) 2015-11-30 2015-11-30 Database virtual patch means of defence

Publications (1)

Publication Number Publication Date
CN106815229A true CN106815229A (en) 2017-06-09

Family

ID=59155496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510852161.8A Pending CN106815229A (en) 2015-11-30 2015-11-30 Database virtual patch means of defence

Country Status (1)

Country Link
CN (1) CN106815229A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107967427A (en) * 2017-12-11 2018-04-27 北京奇虎科技有限公司 Monitor the method, apparatus and terminal device of loophole attack
CN109145601A (en) * 2017-06-27 2019-01-04 英特尔公司 Malware detection system attack prevents
CN109241737A (en) * 2018-07-03 2019-01-18 中国科学院信息工程研究所 A kind of difference linear-elsatic buckling method and system towards a variety of patch modes
CN109359468A (en) * 2018-08-23 2019-02-19 阿里巴巴集团控股有限公司 Leak detection method, device and equipment
CN109460641A (en) * 2018-11-15 2019-03-12 成都网域复兴科技有限公司 A kind of loophole positioning excavation system and method for binary file
CN111859405A (en) * 2020-07-31 2020-10-30 深信服科技股份有限公司 Threat immunization framework, method, equipment and readable storage medium
CN114065227A (en) * 2022-01-18 2022-02-18 思探明信息科技(南京)有限公司 Vulnerability positioning analysis system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156032A1 (en) * 2005-01-03 2006-07-13 Panjwani Dileep K Network-based patching machine
CN101814053A (en) * 2010-03-29 2010-08-25 中国人民解放军信息工程大学 Method for discovering binary code vulnerability based on function model
CN102156650A (en) * 2011-03-02 2011-08-17 奇智软件(北京)有限公司 Method and device capable of implementing automatic analysis of patch
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs
CN104468563A (en) * 2014-12-03 2015-03-25 北京奇虎科技有限公司 Website bug protection method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156032A1 (en) * 2005-01-03 2006-07-13 Panjwani Dileep K Network-based patching machine
CN101814053A (en) * 2010-03-29 2010-08-25 中国人民解放军信息工程大学 Method for discovering binary code vulnerability based on function model
CN102156650A (en) * 2011-03-02 2011-08-17 奇智软件(北京)有限公司 Method and device capable of implementing automatic analysis of patch
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs
CN104468563A (en) * 2014-12-03 2015-03-25 北京奇虎科技有限公司 Website bug protection method, device and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YANGSONG等: "Automatic vulnerability locating in binary patches", 《2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY 》 *
叶云: "基于攻击图的网络安全风险计算研究", 《中国博士学位论文数据库 信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145601A (en) * 2017-06-27 2019-01-04 英特尔公司 Malware detection system attack prevents
CN107967427A (en) * 2017-12-11 2018-04-27 北京奇虎科技有限公司 Monitor the method, apparatus and terminal device of loophole attack
CN109241737A (en) * 2018-07-03 2019-01-18 中国科学院信息工程研究所 A kind of difference linear-elsatic buckling method and system towards a variety of patch modes
CN109359468A (en) * 2018-08-23 2019-02-19 阿里巴巴集团控股有限公司 Leak detection method, device and equipment
CN109359468B (en) * 2018-08-23 2021-12-14 创新先进技术有限公司 Vulnerability detection method, device and equipment
CN109460641A (en) * 2018-11-15 2019-03-12 成都网域复兴科技有限公司 A kind of loophole positioning excavation system and method for binary file
CN111859405A (en) * 2020-07-31 2020-10-30 深信服科技股份有限公司 Threat immunization framework, method, equipment and readable storage medium
CN114065227A (en) * 2022-01-18 2022-02-18 思探明信息科技(南京)有限公司 Vulnerability positioning analysis system

Similar Documents

Publication Publication Date Title
CN106815229A (en) Database virtual patch means of defence
US8225402B1 (en) Anomaly-based detection of SQL injection attacks
Manoharan et al. Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection
CN109922075A (en) Network security knowledge map construction method and apparatus, computer equipment
Tajpour et al. SQL injection detection and prevention tools assessment
CN1291569C (en) Abnormal detection method for user access activity in attached net storage device
RU2018136768A (en) PROTECTIVE CYBER PROTECTION
CN110213226B (en) Network attack scene reconstruction method and system based on risk full-factor identification association
CN106357618A (en) Web abnormality detection method and device
Desai et al. Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA
CN115296924A (en) Network attack prediction method and device based on knowledge graph
CN111935193B (en) Automatic safety protection method based on correlation of camouflage agent and dynamic technology
CN109450882A (en) A kind of security management and control system and method for the internet behavior merging artificial intelligence and big data
CN111669354A (en) Threat information industrial firewall based on machine learning
CN108881316B (en) Attack backtracking method under heaven and earth integrated information network
CN112953918A (en) Network attack protection method combined with big data server and big data protection equipment
CN106850675A (en) A kind of determination method and device of attack
Jindal et al. A survey on database intrusion detection: approaches, challenges and application
Gnatyuk et al. Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.
Makarova Determining the choice of attack methods approach
Zakaria et al. Feature extraction and selection method of cyber-attack and threat profiling in cybersecurity audit
Chaki et al. A Survey on SQL Injection Prevention Methods
Jana et al. Code-based analysis approach to detect and prevent SQL injection attacks
Ali et al. Review of the defensive approaches for structured query language injection attacks and their countermeasures
KR102562671B1 (en) Threat hunting system and method for against social issue-based advanced persistent threat using genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170609