CN103955647A - System bug scanning method - Google Patents
System bug scanning method Download PDFInfo
- Publication number
- CN103955647A CN103955647A CN201410195915.2A CN201410195915A CN103955647A CN 103955647 A CN103955647 A CN 103955647A CN 201410195915 A CN201410195915 A CN 201410195915A CN 103955647 A CN103955647 A CN 103955647A
- Authority
- CN
- China
- Prior art keywords
- leak
- vulnerability
- scanning
- dangerous
- timer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Abstract
The invention discloses a system bug scanning method. The system bug scanning method comprises the following steps: on the basis of a timed scheduling task, starting scanning; scanning system bugs on the basis of a bug base to obtain a scanning result; on the basis of the scanning result, generating a bug report; on the basis of the bug report, generating a notification message and notifying an administrator. By adopting the system bug scanning method, the following technical effects can be achieved: rapid and efficient system bug scanning can be completed; the system bug scanning method is simple in steps and convenient to use; the administrator can be notified of the scanning result; timed scanning can be performed according to the timed scheduling task.
Description
technical field
The present invention relates to information system security research field, relate in particular to a kind of system vulnerability scan method.
Background technology
The progressively quickening of setting up along with IT application in enterprises now, the importance of infosystem has just been well imagined.Infosystem leak has caused assailant can utilize this leak to carry out intrusion base or has attacked the user of web application, obtain thus some important data and interests, if leaky, need to repair at once, otherwise infosystem is easy to be subject to the injury of network and even by hacker, by means of the leak of infosystem, is implanted wooden horse, and consequence is by hardly imaginable so.
Infosystem leak rapid scanning instrument need to be installed by downloading software at present, and self information system is carried out to vulnerability scanning.Its flow process is as follows: scanning software is installed, and input is scanned system address, starts scanning, has scanned rear generation leak inventory.
Existing information system vulnerability rapid scanning mainly faces the problem of four aspects: need to install; Need manual intervention; Scanning result cannot be notified supvr in time; Can not timer-triggered scheduler task scan.
In sum, in the process of present inventor's invention technical scheme in realizing the embodiment of the present application, find that above-mentioned technology at least exists following technical matters:
In the prior art, because existing infosystem vulnerability scanning method need to be installed scanning software, input is scanned system address, start scanning, scanned rear generation leak inventory, cause occurring needing installing, need manual intervention, scanning result cannot be notified supvr in time, can not timer-triggered scheduler task scan, so, existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan.
Summary of the invention
The invention provides a kind of system vulnerability scan method, solved existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, scanning result can be notified supvr, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
For solving the problems of the technologies described above, the embodiment of the present application provides a kind of system vulnerability scan method, and described method comprises:
First, based on timer-triggered scheduler task, carry out sweep start;
Then, based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result;
Then, based on described scanning result, generate leak report;
Finally, based on described leak report, generate announcement information and notify managerial personnel.
Further, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
Further, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprise:
First, obtain the system information of described system;
Then, described system information is mated with the information in described vulnerability database, obtain matching result;
Finally, based on described matching result, obtain described scanning result.
Further, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
Further, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, being that described low level vulnerability is dangerous while being less than or equal to 3, is that described middle level vulnerability is dangerous when the number of leak is greater than 3 while being less than or equal to 5, is that described high level vulnerability is dangerous when the number of leak is greater than 5.
Further, described based on described leak report, generate announcement information and notify managerial personnel specifically to comprise:
First, based on described leak report, obtain leak danger classes;
Then, based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
Further, describedly based on timer-triggered scheduler task, carry out sweep start and specifically comprise:
First, formulate timer-triggered scheduler task;
Then, carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
Further, described scan method is specially uses java exploitation BS pattern, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, and does not have platform limitation, can be applied to include but not limited to Windows and Linux platform.
The one or more technical schemes that provide in the embodiment of the present application, at least have following technique effect or advantage:
Owing to having adopted first, based on timer-triggered scheduler task, carry out sweep start, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of system vulnerability scan method in the embodiment of the present application one;
Fig. 2 carries out the process flow diagram of autoscan according to scheduler task in the embodiment of the present application one;
Fig. 3 is that in the embodiment of the present application one, system vulnerability scan method is applied to the process flow diagram in system.
Embodiment
The invention provides a kind of system vulnerability scan method, solved existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, scanning result can be notified supvr, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Technical scheme during the application implements is for solving the problems of the technologies described above.General thought is as follows:
Adopted first and carried out sweep start based on timer-triggered scheduler task, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
In order better to understand technique scheme, below in conjunction with Figure of description and concrete embodiment, technique scheme is described in detail.
Embodiment mono-:
In embodiment mono-, a kind of system vulnerability scan method is provided, please refer to Fig. 1-Fig. 3, described method comprises:
S10, carries out sweep start based on timer-triggered scheduler task;
S20, carries out vulnerability scanning based on vulnerability database to system, obtains scanning result;
S30, based on described scanning result, generates leak report;
S40, based on described leak report, generates announcement information and notifies managerial personnel.
Wherein, in the embodiment of the present application, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
Wherein, in actual applications, described vulnerability database is constantly detecting, and when new vulnerability information being detected, just upgrades vulnerability database.
Wherein, in actual applications, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprise:
First, obtain the system information of described system;
Then, described system information is mated with the information in described vulnerability database, obtain matching result;
Finally, based on described matching result, obtain described scanning result.
Wherein, in the embodiment of the present application, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
Wherein, in the embodiment of the present application, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, be that described low level vulnerability is dangerous while being less than or equal to 3, when the number of leak is greater than 3, be that described middle level vulnerability is dangerous while being less than or equal to 5, be that described high level vulnerability is dangerous when the number of leak is greater than 5.
Wherein, in the embodiment of the present application, described based on described leak report, generate announcement information and notify managerial personnel specifically to comprise:
First, based on described leak report, obtain leak danger classes;
Then, based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
Wherein, in the embodiment of the present application, describedly based on timer-triggered scheduler task, carry out sweep start and specifically comprise:
First, formulate timer-triggered scheduler task;
Then, carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
Wherein, in actual applications, when scanning based on timer-triggered scheduler task, first, formulate timer-triggered scheduler task, as formulated, in limited time, scan, as scanned between 12 o'clock to 6 o'clock morning, if meet timer-triggered scheduler judgement, in Preset Time section, scan; If do not satisfy condition, scan task queue, can multiple-task in task queue, if do not scanned, scavenge system rubbish etc., the formulation of described scheduler task comprises the formulation of the formulation of the formulation of job title, executive mode, the formulation of execution date and execution time.
Wherein, in the embodiment of the present application, described scan method is specially uses java exploitation BS pattern, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, there is not platform limitation, can be applied to include but not limited to Windows and Linux platform.
Wherein, in actual applications, the timer-triggered scheduler task that method in the embodiment of the present application can be set according to keeper is carried out autoscan: traditional infosystem leak rapid scanning instrument all needs manual intervention, along with information measured system quantity ceaselessly increases, specialty testing staff's workload will increase considerably, and each sweep time is very long, can not realize unmanned pattern.This instrument is by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, kept away infosystem simultaneously and use rush hour, alleviate infosystem burden.
Wherein, in actual applications, method in the embodiment of the present application is used java exploitation BS pattern: existing infosystem leak rapid scanning instrument is only supported the CS pattern instrument of Win32 platform conventionally, only have the weak passwurd scanning tools of only a few to support Linux and Unix platform, the exploitation based on java that method in the embodiment of the present application is used can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, the customizable notification rule of method in the embodiment of the present application, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods.
Wherein, in the embodiment of the present application, please refer to table 1, table 1 is scan method in the embodiment of the present application and the contrast of traditional scan method.
Table 1
Wherein, in actual applications, please refer to Fig. 3, the idiographic flow that the scan method in the embodiment of the present application is applied in reality is:
First start scanning, then obtain the address information that is scanned infosystem, if there is no the end of scan of system address information, if scan the address information of infosystem, start scanning; Then generate leak report; Then, according to leak, notification rule coupling is carried out in report, then notifies managerial personnel, comprising: the modes such as note, micro-letter, mail; Then generating sweep time, leak record preserves into database; Then carry out the scanning of next system.
Technical scheme in above-mentioned the embodiment of the present application, at least has following technique effect or advantage:
Owing to having adopted first, based on timer-triggered scheduler task, carry out sweep start, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Although described the preferred embodiments of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.
Claims (8)
1. a system vulnerability scan method, is characterized in that, described method comprises:
Based on timer-triggered scheduler task, carry out sweep start;
Based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result;
Based on described scanning result, generate leak report;
Based on described leak report, generate announcement information and notify managerial personnel.
2. method according to claim 1, is characterized in that, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
3. method according to claim 1, is characterized in that, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprises:
Obtain the system information of described system;
Described system information is mated with the information in described vulnerability database, obtain matching result;
Based on described matching result, obtain described scanning result.
4. method according to claim 1, is characterized in that, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
5. method according to claim 4, it is characterized in that, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, be that described low level vulnerability is dangerous while being less than or equal to 3, when the number of leak is greater than 3, be that described middle level vulnerability is dangerous while being less than or equal to 5, be that described high level vulnerability is dangerous when the number of leak is greater than 5.
6. method according to claim 5, is characterized in that, described based on described leak report, generates announcement information and notifies managerial personnel specifically to comprise:
Based on described leak report, obtain leak danger classes;
Based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
7. method according to claim 1, is characterized in that, describedly based on timer-triggered scheduler task, carries out sweep start and specifically comprises:
Formulate timer-triggered scheduler task;
Carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
8. method according to claim 1, it is characterized in that, described scan method is specially the java exploitation BS pattern of using, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, there is not platform limitation, can be applied to include but not limited to Windows and Linux platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410195915.2A CN103955647A (en) | 2014-05-12 | 2014-05-12 | System bug scanning method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410195915.2A CN103955647A (en) | 2014-05-12 | 2014-05-12 | System bug scanning method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103955647A true CN103955647A (en) | 2014-07-30 |
Family
ID=51332922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410195915.2A Pending CN103955647A (en) | 2014-05-12 | 2014-05-12 | System bug scanning method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103955647A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778414A (en) * | 2015-05-06 | 2015-07-15 | 广州万方计算机科技有限公司 | Vulnerability management system and method |
CN105320889A (en) * | 2015-02-10 | 2016-02-10 | 中国移动通信集团广东有限公司 | Security detection method and apparatus |
CN105610776A (en) * | 2015-09-24 | 2016-05-25 | 中科信息安全共性技术国家工程研究中心有限公司 | Cloud calculating IaaS layer high risk safety loophole detection method and system thereof |
CN107171979A (en) * | 2017-06-30 | 2017-09-15 | 广州市品高软件股份有限公司 | Vulnerability scanning method and system based on cloud computing and SDN |
CN108063755A (en) * | 2017-11-08 | 2018-05-22 | 携程旅游信息技术(上海)有限公司 | vulnerability scanning method, system, storage medium and electronic equipment |
CN109327471A (en) * | 2018-11-29 | 2019-02-12 | 广东电网有限责任公司信息中心 | A kind of loophole discovery and verifying implementation method of meeting an urgent need |
CN111353161A (en) * | 2020-03-11 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Vulnerability scanning method and device |
WO2021003982A1 (en) * | 2019-07-05 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Service system vulnerability processing method and apparatus, computer device, and storage medium |
CN114186236A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019803A1 (en) * | 2002-07-23 | 2004-01-29 | Alfred Jahn | Network security software |
CN2819666Y (en) * | 2005-10-08 | 2006-09-20 | 姚烈 | Intelligent built-in network terminal system |
CN101119231A (en) * | 2007-07-19 | 2008-02-06 | 南京联创网络科技有限公司 | Method to centralized manage and automatic download mend of computer security leak base |
-
2014
- 2014-05-12 CN CN201410195915.2A patent/CN103955647A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040019803A1 (en) * | 2002-07-23 | 2004-01-29 | Alfred Jahn | Network security software |
CN2819666Y (en) * | 2005-10-08 | 2006-09-20 | 姚烈 | Intelligent built-in network terminal system |
CN101119231A (en) * | 2007-07-19 | 2008-02-06 | 南京联创网络科技有限公司 | Method to centralized manage and automatic download mend of computer security leak base |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320889A (en) * | 2015-02-10 | 2016-02-10 | 中国移动通信集团广东有限公司 | Security detection method and apparatus |
CN104778414A (en) * | 2015-05-06 | 2015-07-15 | 广州万方计算机科技有限公司 | Vulnerability management system and method |
CN105610776A (en) * | 2015-09-24 | 2016-05-25 | 中科信息安全共性技术国家工程研究中心有限公司 | Cloud calculating IaaS layer high risk safety loophole detection method and system thereof |
CN107171979A (en) * | 2017-06-30 | 2017-09-15 | 广州市品高软件股份有限公司 | Vulnerability scanning method and system based on cloud computing and SDN |
CN108063755A (en) * | 2017-11-08 | 2018-05-22 | 携程旅游信息技术(上海)有限公司 | vulnerability scanning method, system, storage medium and electronic equipment |
CN108063755B (en) * | 2017-11-08 | 2020-12-15 | 携程旅游信息技术(上海)有限公司 | Vulnerability scanning method, system, storage medium and electronic equipment |
CN109327471A (en) * | 2018-11-29 | 2019-02-12 | 广东电网有限责任公司信息中心 | A kind of loophole discovery and verifying implementation method of meeting an urgent need |
CN109327471B (en) * | 2018-11-29 | 2021-07-13 | 广东电网有限责任公司信息中心 | Vulnerability discovery and emergency verification implementation method |
WO2021003982A1 (en) * | 2019-07-05 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Service system vulnerability processing method and apparatus, computer device, and storage medium |
CN111353161A (en) * | 2020-03-11 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Vulnerability scanning method and device |
CN114186236A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN114186236B (en) * | 2022-02-17 | 2022-05-27 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103955647A (en) | System bug scanning method | |
US9516064B2 (en) | Method and system for dynamic and comprehensive vulnerability management | |
CN109117169B (en) | Method and device for repairing kernel vulnerability | |
CN107450941B (en) | Automatic packaging method, device, storage medium and computer equipment | |
EP2667314B1 (en) | System and method for detection and treatment of malware on data storage devices | |
CN103473505B (en) | A kind of scanning reminding method of software vulnerability and device | |
GB2588745A (en) | Deferred malware scanning | |
CN108154035B (en) | Large-scale website vulnerability scanning method and device and electronic equipment | |
US6804773B1 (en) | System and method for transferring information over a network | |
CN103679031A (en) | File virus immunizing method and device | |
CN103390130A (en) | Rogue program searching and killing method and device based on cloud security as well as server | |
US10956383B2 (en) | Device backup and wipe | |
CN102708048B (en) | Method and system for testing mobile application | |
CN106326129A (en) | Program abnormity information generating method and device | |
CN102156650B (en) | Method and device capable of implementing automatic analysis of patch | |
US8769520B2 (en) | Calendar aware adaptive patching of a computer program | |
CN109600257B (en) | Tool deployment method, device and storage medium | |
CN104036193A (en) | Local cross-domain vulnerability detection method and device for application program | |
US9148353B1 (en) | Systems and methods for correlating computing problems referenced in social-network communications with events potentially responsible for the same | |
CN104915593A (en) | Binding removing processing method and system for software | |
KR20170127630A (en) | Ransom Ware Blocking Apparatus based on Whitelist and Method therefor | |
CN105354341B (en) | The update method and device of file | |
CN105955730A (en) | Method for obtaining SSR (Server Security Reinforcement) centralized management platform statement | |
CN107391132B (en) | Method, device and equipment for target App to execute preset action | |
WO2014209889A1 (en) | System and method for antivirus protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140730 |