CN103955647A - System bug scanning method - Google Patents

System bug scanning method Download PDF

Info

Publication number
CN103955647A
CN103955647A CN201410195915.2A CN201410195915A CN103955647A CN 103955647 A CN103955647 A CN 103955647A CN 201410195915 A CN201410195915 A CN 201410195915A CN 103955647 A CN103955647 A CN 103955647A
Authority
CN
China
Prior art keywords
leak
vulnerability
scanning
dangerous
timer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410195915.2A
Other languages
Chinese (zh)
Inventor
刘姗梅
柴继文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Sichuan Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Sichuan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Sichuan Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410195915.2A priority Critical patent/CN103955647A/en
Publication of CN103955647A publication Critical patent/CN103955647A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Abstract

The invention discloses a system bug scanning method. The system bug scanning method comprises the following steps: on the basis of a timed scheduling task, starting scanning; scanning system bugs on the basis of a bug base to obtain a scanning result; on the basis of the scanning result, generating a bug report; on the basis of the bug report, generating a notification message and notifying an administrator. By adopting the system bug scanning method, the following technical effects can be achieved: rapid and efficient system bug scanning can be completed; the system bug scanning method is simple in steps and convenient to use; the administrator can be notified of the scanning result; timed scanning can be performed according to the timed scheduling task.

Description

A kind of system vulnerability scan method
technical field
The present invention relates to information system security research field, relate in particular to a kind of system vulnerability scan method.
Background technology
The progressively quickening of setting up along with IT application in enterprises now, the importance of infosystem has just been well imagined.Infosystem leak has caused assailant can utilize this leak to carry out intrusion base or has attacked the user of web application, obtain thus some important data and interests, if leaky, need to repair at once, otherwise infosystem is easy to be subject to the injury of network and even by hacker, by means of the leak of infosystem, is implanted wooden horse, and consequence is by hardly imaginable so.
Infosystem leak rapid scanning instrument need to be installed by downloading software at present, and self information system is carried out to vulnerability scanning.Its flow process is as follows: scanning software is installed, and input is scanned system address, starts scanning, has scanned rear generation leak inventory.
Existing information system vulnerability rapid scanning mainly faces the problem of four aspects: need to install; Need manual intervention; Scanning result cannot be notified supvr in time; Can not timer-triggered scheduler task scan.
In sum, in the process of present inventor's invention technical scheme in realizing the embodiment of the present application, find that above-mentioned technology at least exists following technical matters:
In the prior art, because existing infosystem vulnerability scanning method need to be installed scanning software, input is scanned system address, start scanning, scanned rear generation leak inventory, cause occurring needing installing, need manual intervention, scanning result cannot be notified supvr in time, can not timer-triggered scheduler task scan, so, existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan.
Summary of the invention
The invention provides a kind of system vulnerability scan method, solved existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, scanning result can be notified supvr, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
For solving the problems of the technologies described above, the embodiment of the present application provides a kind of system vulnerability scan method, and described method comprises:
First, based on timer-triggered scheduler task, carry out sweep start;
Then, based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result;
Then, based on described scanning result, generate leak report;
Finally, based on described leak report, generate announcement information and notify managerial personnel.
Further, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
Further, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprise:
First, obtain the system information of described system;
Then, described system information is mated with the information in described vulnerability database, obtain matching result;
Finally, based on described matching result, obtain described scanning result.
Further, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
Further, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, being that described low level vulnerability is dangerous while being less than or equal to 3, is that described middle level vulnerability is dangerous when the number of leak is greater than 3 while being less than or equal to 5, is that described high level vulnerability is dangerous when the number of leak is greater than 5.
Further, described based on described leak report, generate announcement information and notify managerial personnel specifically to comprise:
First, based on described leak report, obtain leak danger classes;
Then, based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
Further, describedly based on timer-triggered scheduler task, carry out sweep start and specifically comprise:
First, formulate timer-triggered scheduler task;
Then, carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
Further, described scan method is specially uses java exploitation BS pattern, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, and does not have platform limitation, can be applied to include but not limited to Windows and Linux platform.
The one or more technical schemes that provide in the embodiment of the present application, at least have following technique effect or advantage:
Owing to having adopted first, based on timer-triggered scheduler task, carry out sweep start, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of system vulnerability scan method in the embodiment of the present application one;
Fig. 2 carries out the process flow diagram of autoscan according to scheduler task in the embodiment of the present application one;
Fig. 3 is that in the embodiment of the present application one, system vulnerability scan method is applied to the process flow diagram in system.
Embodiment
The invention provides a kind of system vulnerability scan method, solved existing infosystem vulnerability scanning method exist use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, scanning result can be notified supvr, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Technical scheme during the application implements is for solving the problems of the technologies described above.General thought is as follows:
Adopted first and carried out sweep start based on timer-triggered scheduler task, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
In order better to understand technique scheme, below in conjunction with Figure of description and concrete embodiment, technique scheme is described in detail.
Embodiment mono-:
In embodiment mono-, a kind of system vulnerability scan method is provided, please refer to Fig. 1-Fig. 3, described method comprises:
S10, carries out sweep start based on timer-triggered scheduler task;
S20, carries out vulnerability scanning based on vulnerability database to system, obtains scanning result;
S30, based on described scanning result, generates leak report;
S40, based on described leak report, generates announcement information and notifies managerial personnel.
Wherein, in the embodiment of the present application, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
Wherein, in actual applications, described vulnerability database is constantly detecting, and when new vulnerability information being detected, just upgrades vulnerability database.
Wherein, in actual applications, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprise:
First, obtain the system information of described system;
Then, described system information is mated with the information in described vulnerability database, obtain matching result;
Finally, based on described matching result, obtain described scanning result.
Wherein, in the embodiment of the present application, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
Wherein, in the embodiment of the present application, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, be that described low level vulnerability is dangerous while being less than or equal to 3, when the number of leak is greater than 3, be that described middle level vulnerability is dangerous while being less than or equal to 5, be that described high level vulnerability is dangerous when the number of leak is greater than 5.
Wherein, in the embodiment of the present application, described based on described leak report, generate announcement information and notify managerial personnel specifically to comprise:
First, based on described leak report, obtain leak danger classes;
Then, based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
Wherein, in the embodiment of the present application, describedly based on timer-triggered scheduler task, carry out sweep start and specifically comprise:
First, formulate timer-triggered scheduler task;
Then, carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
Wherein, in actual applications, when scanning based on timer-triggered scheduler task, first, formulate timer-triggered scheduler task, as formulated, in limited time, scan, as scanned between 12 o'clock to 6 o'clock morning, if meet timer-triggered scheduler judgement, in Preset Time section, scan; If do not satisfy condition, scan task queue, can multiple-task in task queue, if do not scanned, scavenge system rubbish etc., the formulation of described scheduler task comprises the formulation of the formulation of the formulation of job title, executive mode, the formulation of execution date and execution time.
Wherein, in the embodiment of the present application, described scan method is specially uses java exploitation BS pattern, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, there is not platform limitation, can be applied to include but not limited to Windows and Linux platform.
Wherein, in actual applications, the timer-triggered scheduler task that method in the embodiment of the present application can be set according to keeper is carried out autoscan: traditional infosystem leak rapid scanning instrument all needs manual intervention, along with information measured system quantity ceaselessly increases, specialty testing staff's workload will increase considerably, and each sweep time is very long, can not realize unmanned pattern.This instrument is by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, kept away infosystem simultaneously and use rush hour, alleviate infosystem burden.
Wherein, in actual applications, method in the embodiment of the present application is used java exploitation BS pattern: existing infosystem leak rapid scanning instrument is only supported the CS pattern instrument of Win32 platform conventionally, only have the weak passwurd scanning tools of only a few to support Linux and Unix platform, the exploitation based on java that method in the embodiment of the present application is used can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, the customizable notification rule of method in the embodiment of the present application, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods.
Wherein, in the embodiment of the present application, please refer to table 1, table 1 is scan method in the embodiment of the present application and the contrast of traditional scan method.
Table 1
Wherein, in actual applications, please refer to Fig. 3, the idiographic flow that the scan method in the embodiment of the present application is applied in reality is:
First start scanning, then obtain the address information that is scanned infosystem, if there is no the end of scan of system address information, if scan the address information of infosystem, start scanning; Then generate leak report; Then, according to leak, notification rule coupling is carried out in report, then notifies managerial personnel, comprising: the modes such as note, micro-letter, mail; Then generating sweep time, leak record preserves into database; Then carry out the scanning of next system.
Technical scheme in above-mentioned the embodiment of the present application, at least has following technique effect or advantage:
Owing to having adopted first, based on timer-triggered scheduler task, carry out sweep start, then based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result, then based on described scanning result, the report of generation leak, finally based on described leak report, generate announcement information and notify managerial personnel's technical scheme, the timer-triggered scheduler task that can set according to keeper is carried out autoscan, by timer-triggered scheduler task, the moment of generally choosing website visiting amount minimum at night is scanned, without manual intervention, scanned a website, then scan all the other websites, significantly alleviate professional testing staff's workload, keep away infosystem simultaneously and used rush hour, alleviate infosystem burden, use java exploitation BS pattern, the exploitation based on java of using can be applicable to Windows and Linux platform, user is without installation, can directly in browser, use, and customizable notification rule, value to infosystem assets, the number of infosystem leak, the situations such as the number of high-risk leak are configured different advice methods, so, efficiently solving existing infosystem vulnerability scanning method exists use inconvenient, step is complicated, scan efficiency is lower, scanning result cannot be notified supvr, technical matters that can not timer-triggered scheduler task scan, and then realized completion system vulnerability scanning rapidly and efficiently, and step is simple, easy to use, without manual intervention, alleviate staff's workload, reduced the burden of system, scanning result can be notified supvr, and advice method diversification, can carry out according to timer-triggered scheduler task the technique effect of timing scan.
Although described the preferred embodiments of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (8)

1. a system vulnerability scan method, is characterized in that, described method comprises:
Based on timer-triggered scheduler task, carry out sweep start;
Based on vulnerability database, system is carried out to vulnerability scanning, obtain scanning result;
Based on described scanning result, generate leak report;
Based on described leak report, generate announcement information and notify managerial personnel.
2. method according to claim 1, is characterized in that, described vulnerability database has automatically updating function, and described vulnerability database can upgrade and obtain vulnerability information.
3. method according to claim 1, is characterized in that, describedly based on vulnerability database, system is carried out to vulnerability scanning, obtains scanning result, specifically comprises:
Obtain the system information of described system;
Described system information is mated with the information in described vulnerability database, obtain matching result;
Based on described matching result, obtain described scanning result.
4. method according to claim 1, is characterized in that, described leak report includes but not limited to: leak title, leak danger classes, leak repair mode.
5. method according to claim 4, it is characterized in that, described leak danger classes is specifically divided into: without dangerous leak, dangerous, the high level vulnerability danger of dangerous, the middle level vulnerability of low level vulnerability, wherein, when there is no leak, for described dangerous without leak, when the number of leak is more than or equal to 1, be that described low level vulnerability is dangerous while being less than or equal to 3, when the number of leak is greater than 3, be that described middle level vulnerability is dangerous while being less than or equal to 5, be that described high level vulnerability is dangerous when the number of leak is greater than 5.
6. method according to claim 5, is characterized in that, described based on described leak report, generates announcement information and notifies managerial personnel specifically to comprise:
Based on described leak report, obtain leak danger classes;
Based on described leak danger classes, generate advice method, wherein, if described leak danger classes is without dangerous leak, do not notify managerial personnel; If it is dangerous that described leak danger classes is low level vulnerability, by lettergram mode, notify managerial personnel; If it is dangerous that described leak danger classes is middle level vulnerability, by mail and short message mode, notify managerial personnel simultaneously; If it is dangerous that described leak danger classes is high level vulnerability, by mail, note, micro-letter mode, notify managerial personnel simultaneously.
7. method according to claim 1, is characterized in that, describedly based on timer-triggered scheduler task, carries out sweep start and specifically comprises:
Formulate timer-triggered scheduler task;
Carry out timer-triggered scheduler judgement, if satisfy condition, start scanning; If do not satisfy condition, scan task queue.
8. method according to claim 1, it is characterized in that, described scan method is specially the java exploitation BS pattern of using, according to the cross-platform characteristic of JAVA, can under the platform that JVM interpreter is installed, use, there is not platform limitation, can be applied to include but not limited to Windows and Linux platform.
CN201410195915.2A 2014-05-12 2014-05-12 System bug scanning method Pending CN103955647A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410195915.2A CN103955647A (en) 2014-05-12 2014-05-12 System bug scanning method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410195915.2A CN103955647A (en) 2014-05-12 2014-05-12 System bug scanning method

Publications (1)

Publication Number Publication Date
CN103955647A true CN103955647A (en) 2014-07-30

Family

ID=51332922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410195915.2A Pending CN103955647A (en) 2014-05-12 2014-05-12 System bug scanning method

Country Status (1)

Country Link
CN (1) CN103955647A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778414A (en) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 Vulnerability management system and method
CN105320889A (en) * 2015-02-10 2016-02-10 中国移动通信集团广东有限公司 Security detection method and apparatus
CN105610776A (en) * 2015-09-24 2016-05-25 中科信息安全共性技术国家工程研究中心有限公司 Cloud calculating IaaS layer high risk safety loophole detection method and system thereof
CN107171979A (en) * 2017-06-30 2017-09-15 广州市品高软件股份有限公司 Vulnerability scanning method and system based on cloud computing and SDN
CN108063755A (en) * 2017-11-08 2018-05-22 携程旅游信息技术(上海)有限公司 vulnerability scanning method, system, storage medium and electronic equipment
CN109327471A (en) * 2018-11-29 2019-02-12 广东电网有限责任公司信息中心 A kind of loophole discovery and verifying implementation method of meeting an urgent need
CN111353161A (en) * 2020-03-11 2020-06-30 腾讯科技(深圳)有限公司 Vulnerability scanning method and device
WO2021003982A1 (en) * 2019-07-05 2021-01-14 深圳壹账通智能科技有限公司 Service system vulnerability processing method and apparatus, computer device, and storage medium
CN114186236A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040019803A1 (en) * 2002-07-23 2004-01-29 Alfred Jahn Network security software
CN2819666Y (en) * 2005-10-08 2006-09-20 姚烈 Intelligent built-in network terminal system
CN101119231A (en) * 2007-07-19 2008-02-06 南京联创网络科技有限公司 Method to centralized manage and automatic download mend of computer security leak base

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040019803A1 (en) * 2002-07-23 2004-01-29 Alfred Jahn Network security software
CN2819666Y (en) * 2005-10-08 2006-09-20 姚烈 Intelligent built-in network terminal system
CN101119231A (en) * 2007-07-19 2008-02-06 南京联创网络科技有限公司 Method to centralized manage and automatic download mend of computer security leak base

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320889A (en) * 2015-02-10 2016-02-10 中国移动通信集团广东有限公司 Security detection method and apparatus
CN104778414A (en) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 Vulnerability management system and method
CN105610776A (en) * 2015-09-24 2016-05-25 中科信息安全共性技术国家工程研究中心有限公司 Cloud calculating IaaS layer high risk safety loophole detection method and system thereof
CN107171979A (en) * 2017-06-30 2017-09-15 广州市品高软件股份有限公司 Vulnerability scanning method and system based on cloud computing and SDN
CN108063755A (en) * 2017-11-08 2018-05-22 携程旅游信息技术(上海)有限公司 vulnerability scanning method, system, storage medium and electronic equipment
CN108063755B (en) * 2017-11-08 2020-12-15 携程旅游信息技术(上海)有限公司 Vulnerability scanning method, system, storage medium and electronic equipment
CN109327471A (en) * 2018-11-29 2019-02-12 广东电网有限责任公司信息中心 A kind of loophole discovery and verifying implementation method of meeting an urgent need
CN109327471B (en) * 2018-11-29 2021-07-13 广东电网有限责任公司信息中心 Vulnerability discovery and emergency verification implementation method
WO2021003982A1 (en) * 2019-07-05 2021-01-14 深圳壹账通智能科技有限公司 Service system vulnerability processing method and apparatus, computer device, and storage medium
CN111353161A (en) * 2020-03-11 2020-06-30 腾讯科技(深圳)有限公司 Vulnerability scanning method and device
CN114186236A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN114186236B (en) * 2022-02-17 2022-05-27 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device

Similar Documents

Publication Publication Date Title
CN103955647A (en) System bug scanning method
US9516064B2 (en) Method and system for dynamic and comprehensive vulnerability management
CN109117169B (en) Method and device for repairing kernel vulnerability
CN107450941B (en) Automatic packaging method, device, storage medium and computer equipment
EP2667314B1 (en) System and method for detection and treatment of malware on data storage devices
CN103473505B (en) A kind of scanning reminding method of software vulnerability and device
GB2588745A (en) Deferred malware scanning
CN108154035B (en) Large-scale website vulnerability scanning method and device and electronic equipment
US6804773B1 (en) System and method for transferring information over a network
CN103679031A (en) File virus immunizing method and device
CN103390130A (en) Rogue program searching and killing method and device based on cloud security as well as server
US10956383B2 (en) Device backup and wipe
CN102708048B (en) Method and system for testing mobile application
CN106326129A (en) Program abnormity information generating method and device
CN102156650B (en) Method and device capable of implementing automatic analysis of patch
US8769520B2 (en) Calendar aware adaptive patching of a computer program
CN109600257B (en) Tool deployment method, device and storage medium
CN104036193A (en) Local cross-domain vulnerability detection method and device for application program
US9148353B1 (en) Systems and methods for correlating computing problems referenced in social-network communications with events potentially responsible for the same
CN104915593A (en) Binding removing processing method and system for software
KR20170127630A (en) Ransom Ware Blocking Apparatus based on Whitelist and Method therefor
CN105354341B (en) The update method and device of file
CN105955730A (en) Method for obtaining SSR (Server Security Reinforcement) centralized management platform statement
CN107391132B (en) Method, device and equipment for target App to execute preset action
WO2014209889A1 (en) System and method for antivirus protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140730