CN105635121A - Vulnerability severity level distribution statistical method based on manufacturers, device and system - Google Patents

Vulnerability severity level distribution statistical method based on manufacturers, device and system Download PDF

Info

Publication number
CN105635121A
CN105635121A CN201510977769.3A CN201510977769A CN105635121A CN 105635121 A CN105635121 A CN 105635121A CN 201510977769 A CN201510977769 A CN 201510977769A CN 105635121 A CN105635121 A CN 105635121A
Authority
CN
China
Prior art keywords
security breaches
leak
list
network
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510977769.3A
Other languages
Chinese (zh)
Inventor
黄友俊
李星
吴建平
郭强
曲永丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CERNET Corp
Original Assignee
CERNET Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CERNET Corp filed Critical CERNET Corp
Priority to CN201510977769.3A priority Critical patent/CN105635121A/en
Publication of CN105635121A publication Critical patent/CN105635121A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a vulnerability severity level distribution statistical method based on manufacturers, a device and a system. The method comprises the following steps: according to a vulnerability issuance website list, periodically scanning to obtain the latest security vulnerabilities, forming a latest network vulnerability list and storing the latest network vulnerability list to a database; acquiring the latest network vulnerability list stored in the database, identifying the security vulnerabilities in the latest network vulnerability list according to a predetermined rule, thereby sorting the security vulnerabilities and appointing development manufactures corresponding to the security vulnerabilities; according to severity levels of the identified security vulnerabilities and corresponding extent of generated security influence, generating a weighted severity level score for each security vulnerability in the latest network vulnerability list, performing statistics through different time dimensions, and finally obtaining a ranking of security vulnerability levels of the development manufactures corresponding to the network vulnerabilities; and according to the ranking of security vulnerability severity levels, informing corresponding development manufactures according to a ranking order to solve corresponding security vulnerabilities.

Description

A kind of based on the leak menace level distribution statistical method of manufacturer, device and system
Technical field
The present invention relates to technical field of network security, more particularly, to a kind of based on the leak menace level distribution statistical method of manufacturer, device and system.
Background technology
, the data combing mending sky leak response platform is found a few days ago, between 12 months of in April, 2014 in March, 2015, mend effective University Websites leak of display on balance table and, up to 3495, relate to University Websites 1088. Wherein, high-risk leak 2611, account for 74.7%; Middle danger leak 691, accounts for 19.8%; Low danger leak 193, accounts for 5.5%.
And it is a concern that between 1 year in the past, it is being apprised of after website exists leak, the University Websites of meeting patching bugs only has 35, only 186 leaks are repaired, and the University Websites of 96.8% ignores the existence of security breaches completely, and the University Websites security breaches of 94.6% are not repaired.
The network security problem of education network is so severe, is badly in need of solving as early as possible.
Summary of the invention
In order to solve the problems referred to above, the present invention proposes a kind of based on the leak menace level distribution statistical method of manufacturer, device and system. The method by a leak found is carried out class indication, can indicate affiliated manufacturer, thus obtaining the weighted scoring ranking of application vendor, assisted network safety officer links up patching bugs with manufacturer, improves the overall security of network application.
According to an aspect of the present invention, which providing a kind of leak based on manufacturer and seriously register distribution statistical method, the method includes the steps of:
Step S1, regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Step S2, according to described leak issuing web site list, periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Step S3, obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list is identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Step S4, menace level according to the security breaches identified and to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Step S5, according to described security breaches menace level ranking, according to ranking successively notice, corresponding development company solves corresponding security breaches.
According to a further aspect of the invention, which provide a kind of leak based on manufacturer and seriously register distribution statistics device, including:
Leak delivery network list acquisition module, it regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Up-to-date security scan module, it is according to described leak issuing web site list, and periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Security breaches mark module, it obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list are identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Grade scoring module, it is according to the menace level of the security breaches identified with to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Leak solves notification module, and it is according to described security breaches menace level ranking, and according to ranking sequencing notice, corresponding development company solves corresponding security breaches.
According to a third aspect of the present invention, which providing a kind of leak menace level distribution statistical system based on manufacturer, this system includes: network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server; Wherein:
Described network hole acquisition server for according to leak issuing web site list, gathers the security breaches that network is up-to-date automatically, and is saved in described cyberspace vulnerability database server after being organized into network hole list;
Described network hole mark system, it is responsible for the described network hole list collected is processed, and specifically comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, manufacturer's leak statistics, user's leak statistics, mail management.
The present invention, by analyzing the safety loophole information that each security website comes out, identifies manufacturer belonging to leak, and the leak menace level exposed by manufacturer belonging to networking products is collected, and carries out the management of manufacturer's security breaches. System contains the vulnerability information based on the scanning HTTP page and captures server, leak mark and analysis system server and database server composition. After obtaining vulnerability information and completing mark work, using the analytic statistics result network security management foundation as network software provider.
Accompanying drawing explanation
Fig. 1 illustrates the leak menace level distribution statistical method flow chart based on manufacturer of the present invention;
Fig. 2 illustrates the structural framing figure of the leak menace level distribution statistical system based on manufacturer of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in further detail.
As it is shown in figure 1, the present invention proposes a kind of leak menace level distribution statistical method based on manufacturer, the method includes the steps of:
Step S1, obtains leak issuing web site list, is used for being supplied to leak acquisition server standby.
The list of leak issuing web site described in step according to certain automatic generation, or can regularly be arranged by safety manager and obtain; Described leak issuing web site list includes more emerging vulnerability informations and associated description.
Step S2, by leak acquisition server according to described leak issuing web site list, the vulnerability information of each website orientation in leak issuing web site list described in periodic scanning, and after obtaining up-to-date vulnerability information, it is organized into the latest network leak list of predetermined format, is saved in data base.
In above-mentioned steps S2, the associated description of the vulnerability information that system is issued according to the website in described leak issuing web site list, there is unit or the school of corresponding vulnerability information in auto-associating, and associates the branch company's (being in charge of described unit or the branch company of school eduaction net) belonging to described unit or school and great Qu information. Described leak is also carried out preliminary classification by this system;
Step S3, the relevant information of leak, for obtaining the latest network leak list of storage in data base, is identified by network hole mark system according to pre-defined rule, is classified by network hole and specifies corresponding development company. Described mark can be automatic mark, it is also possible to be manager manual identification, or both combinations.
Before carrying out step S3, system can the menace level of leak in first latest network leak list according to data base be ranked up, and leak ranking that is more serious and that have considerable influence is front. In pending list, network security manager needs the vulnerability information that priority treatment menace level is higher, and the affiliated manufacturer finding leak software is identified.
In step s3, it is necessary to identify following content successively:
Leak type: such as struts2 leak, DDos attacks, and SQL injects, web back door etc.
Leak menace level: minimum 1 grade, the highest 10 grades.
Affiliated manufacturer: the development company of the Web software of leak occurs, if not commercial product, is designated as owning user unit or school.
Affiliated branch company: occur the belonging network of the URL correspondence user of leak to run branch company.
Step S4, affects according to leak menace level and security breaches, generates the scoring of weighting menace level, then with every day, weekly, 30 days, quarterly, the different time dimension such as annual add up, obtain the security breaches menace level TOPN ranking of development company.
Weighted scoring described in step S4, is judged by attribute synthesis such as leak menace level, leak website or product access times, unresolved times.
Step S5, according to security breaches menace level ranking, the development company more serious according to the safety problem of ranking sequencing contact solves leak problem, and for not having the leak of success flag development company, the Subscriber Unit corresponding by the contact of network operation branch company or school solve.
As in figure 2 it is shown, the invention allows for a kind of leak menace level distribution statistical system based on manufacturer, this system includes network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server. Wherein:
Described network hole acquisition server is for according to the leak issuing web site list preset, automatically gathering cyberspace vulnerability information, form network hole list. This system is always according to associated description about the complete leak of network in described network hole list, described leak is carried out preliminary classification coupling, indicate the vulnerability informations such as leak type, source address, affiliated unit or school, affiliated branch company, affiliated great Qu, and described network hole list is saved in data base.
Described network hole mark system, is responsible for the network hole list collected is processed, and comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, the function such as manufacturer's leak statistics, user's leak statistics, mail management. System is made up of Web service and DB database service, and data are saved in data base, and manager is identified work on Web system services, and as statistics show surroundings.
In described network hole mark system, user's management comprises all Subscriber Units and the school information of system administration.
Manufacturer manages, and comprises the information of network software provider. And manufacturer's information also comprises the software matrix that manufacturer provides, conveniently carries out matching identification.
Security breaches identification function, is operated by network security manager, verifies the vulnerability information in described network hole list, and the source identifying vulnerability information is the information such as affiliated branch company, affiliated manufacturer, menace level, leak type.
Security breaches are added up, and using leak itself as index, a situation arises for the leak in statistics stipulated time section, and the occurrence frequency of various leaks is added up.
Manufacturer's leak statistics, the untreated leak situation of statistics manufacturer. Ranking can be carried out according to weighted scoring.
The present invention, by analyzing the safety loophole information that each security website comes out, identifies manufacturer belonging to leak, and the leak menace level exposed by manufacturer belonging to networking products is collected, and carries out the management of manufacturer's security breaches. System contains the vulnerability information based on the scanning HTTP page and captures server, leak mark and analysis system server and database server composition. After obtaining vulnerability information and completing mark work, using the analytic statistics result network security management foundation as network software provider.
Particular embodiments described above; the purpose of the present invention, technical scheme and beneficial effect have been further described; it is it should be understood that; the foregoing is only specific embodiments of the invention; it is not limited to the present invention; all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (10)

1. the leak based on manufacturer seriously registers distribution statistical method, it is characterised in that the method includes the steps of:
Step S1, regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Step S2, according to described leak issuing web site list, periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Step S3, obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list is identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Step S4, menace level according to the security breaches identified and to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Step S5, according to described security breaches menace level ranking, according to ranking successively notice, corresponding development company solves corresponding security breaches.
2. the method for claim 1, wherein, step S2 also includes the up-to-date security breaches obtained according to scanning, there is unit or the school of corresponding security breaches in auto-associating, and associate the network operation branch company at described unit or school place and affiliated great Qu information, also described up-to-date security breaches are carried out preliminary classification simultaneously.
3. the method for claim 1, wherein described security breaches are identified specifically including by step S3:
Identify the type of described security breaches;
Identify the menace level of described security breaches;
Identify the development company described in described security breaches;
Mark occurs network linking correspondence user's belonging network of described security breaches to run branch company.
4. the method for claim 1, wherein the scoring of described weighting menace level is weighted comprehensive grading according to leak menace level, leak website or product access times, unresolved time.
5. the leak based on manufacturer seriously registers distribution statistics device, it is characterised in that including:
Leak delivery network list acquisition module, it regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Up-to-date security scan module, it is according to described leak issuing web site list, and periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Security breaches mark module, it obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list are identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Grade scoring module, it is according to the menace level of the security breaches identified with to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Leak solves notification module, and it is according to described security breaches menace level ranking, and according to ranking sequencing notice, corresponding development company solves corresponding security breaches.
6. device as claimed in claim 5, wherein, the up-to-date security breaches that up-to-date security scan module obtains always according to scanning, there is unit or the school of corresponding security breaches in auto-associating, and associate the network operation branch company at described unit or school place and affiliated great Qu information, also described up-to-date security breaches are carried out preliminary classification simultaneously.
7. device as claimed in claim 5, wherein, described security breaches are identified specifically including by security breaches mark module:
Identify the type of described security breaches;
Identify the menace level of described security breaches;
Identify the development company described in described security breaches;
Mark occurs network linking correspondence user's belonging network of described security breaches to run branch company.
8. device as claimed in claim 5, wherein, the scoring of described weighting menace level is weighted comprehensive grading according to leak menace level, leak website or product access times, unresolved time.
9. the leak menace level distribution statistical system based on manufacturer, it is characterised in that this system includes: network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server; Wherein:
Described network hole acquisition server for according to leak issuing web site list, gathers the security breaches that network is up-to-date automatically, and is saved in described cyberspace vulnerability database server after being organized into network hole list;
Described network hole mark system, it is responsible for the described network hole list collected is processed, and specifically comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, manufacturer's leak statistics, user's leak statistics, mail management.
10. system as claimed in claim 9, wherein, described user management includes all Subscriber Units and the school information of system administration; Manufacturer's management includes the information of network software provider, the software matrix that manufacturer provides; Security breaches mark includes identifying branch company, affiliated manufacturer, menace level and leak type described in the security breaches in described network hole list; Security breaches statistics includes the situation that in statistics predetermined amount of time, security breaches occur, and the occurrence frequency of various security breaches is added up; Manufacturer's leak statistics includes the situation of the untreated security breaches of statistics manufacturer, according to weighted scoring, manufacturer is carried out ranking.
CN201510977769.3A 2015-12-23 2015-12-23 Vulnerability severity level distribution statistical method based on manufacturers, device and system Pending CN105635121A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510977769.3A CN105635121A (en) 2015-12-23 2015-12-23 Vulnerability severity level distribution statistical method based on manufacturers, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510977769.3A CN105635121A (en) 2015-12-23 2015-12-23 Vulnerability severity level distribution statistical method based on manufacturers, device and system

Publications (1)

Publication Number Publication Date
CN105635121A true CN105635121A (en) 2016-06-01

Family

ID=56049612

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510977769.3A Pending CN105635121A (en) 2015-12-23 2015-12-23 Vulnerability severity level distribution statistical method based on manufacturers, device and system

Country Status (1)

Country Link
CN (1) CN105635121A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453386A (en) * 2016-11-09 2017-02-22 深圳市魔方安全科技有限公司 Automatic internet asset monitoring and risk detecting method based on distributed technology
CN108228713A (en) * 2017-12-01 2018-06-29 中国电子科技集团公司电子科学研究院 Loophole base construction method, device, vulnerability database and computer readable storage medium
CN108985068A (en) * 2018-06-26 2018-12-11 广东电网有限责任公司信息中心 Loophole quick sensing, positioning and the method and system of verifying
CN109690492A (en) * 2016-07-29 2019-04-26 摩根大通银行国家协会 Cyberspace vulnerability management system and method
CN110768977A (en) * 2019-10-21 2020-02-07 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information
CN111277555A (en) * 2018-12-05 2020-06-12 中国移动通信集团河南有限公司 Vulnerability false alarm screening method and device
CN111865927A (en) * 2020-06-24 2020-10-30 平安普惠企业管理有限公司 Vulnerability processing method and device based on system, computer equipment and storage medium
CN112069503A (en) * 2020-08-05 2020-12-11 长沙市到家悠享网络科技有限公司 Task management method, device and storage medium
CN112286571A (en) * 2020-09-25 2021-01-29 长沙市到家悠享网络科技有限公司 Vulnerability repairing method and device and storage medium
CN114186236A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN114186235A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN115102751A (en) * 2022-06-17 2022-09-23 西安热工研究院有限公司 Method for testing capability of safety service manufacturer
CN116561769A (en) * 2023-05-19 2023-08-08 国家计算机网络与信息安全管理中心 Vendor recommendation method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102354310A (en) * 2011-07-12 2012-02-15 广东电网公司信息中心 Method and system for automated information security evaluation
CN104618178A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Website bug online evaluation method and device
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102354310A (en) * 2011-07-12 2012-02-15 广东电网公司信息中心 Method and system for automated information security evaluation
CN104618178A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Website bug online evaluation method and device
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109690492A (en) * 2016-07-29 2019-04-26 摩根大通银行国家协会 Cyberspace vulnerability management system and method
CN109690492B (en) * 2016-07-29 2023-09-29 摩根大通银行国家协会 Network security vulnerability management system and method
CN106453386A (en) * 2016-11-09 2017-02-22 深圳市魔方安全科技有限公司 Automatic internet asset monitoring and risk detecting method based on distributed technology
CN108228713A (en) * 2017-12-01 2018-06-29 中国电子科技集团公司电子科学研究院 Loophole base construction method, device, vulnerability database and computer readable storage medium
CN108985068A (en) * 2018-06-26 2018-12-11 广东电网有限责任公司信息中心 Loophole quick sensing, positioning and the method and system of verifying
CN111277555B (en) * 2018-12-05 2022-03-11 中国移动通信集团河南有限公司 Vulnerability false alarm screening method and device
CN111277555A (en) * 2018-12-05 2020-06-12 中国移动通信集团河南有限公司 Vulnerability false alarm screening method and device
CN110768977A (en) * 2019-10-21 2020-02-07 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information
CN110768977B (en) * 2019-10-21 2022-02-25 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information
CN111865927B (en) * 2020-06-24 2024-04-05 天翼安全科技有限公司 Vulnerability processing method and device based on system, computer equipment and storage medium
CN111865927A (en) * 2020-06-24 2020-10-30 平安普惠企业管理有限公司 Vulnerability processing method and device based on system, computer equipment and storage medium
CN112069503A (en) * 2020-08-05 2020-12-11 长沙市到家悠享网络科技有限公司 Task management method, device and storage medium
CN112286571A (en) * 2020-09-25 2021-01-29 长沙市到家悠享网络科技有限公司 Vulnerability repairing method and device and storage medium
CN114186235A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN114186236B (en) * 2022-02-17 2022-05-27 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN114186236A (en) * 2022-02-17 2022-03-15 北京搜狐新媒体信息技术有限公司 Security vulnerability processing method and device
CN115102751A (en) * 2022-06-17 2022-09-23 西安热工研究院有限公司 Method for testing capability of safety service manufacturer
CN115102751B (en) * 2022-06-17 2023-09-15 西安热工研究院有限公司 Method for checking capability of security service manufacturer
CN116561769A (en) * 2023-05-19 2023-08-08 国家计算机网络与信息安全管理中心 Vendor recommendation method, device, equipment and storage medium
CN116561769B (en) * 2023-05-19 2024-05-14 国家计算机网络与信息安全管理中心 Vendor recommendation method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105635121A (en) Vulnerability severity level distribution statistical method based on manufacturers, device and system
US10248730B2 (en) Statistical method and apparatus for webpage access data
CA3066493A1 (en) System and method for a vendor risk management platform
Borthakur et al. How well are we managing E-waste in India: evidences from the city of Bangalore
CN108712426A (en) Reptile recognition methods and system a little are buried based on user behavior
CN103455758A (en) Method and device for identifying malicious website
CN106878316B (en) Risk quantification method and device
CN111859234A (en) Illegal content identification method and device, electronic equipment and storage medium
CN115314276B (en) Security check management system, method and terminal equipment
CN112422574A (en) Risk account identification method, device, medium and electronic equipment
de Faria et al. The determinants mostly disclosed by companies that are members of the Carbon Disclosure Project
CN104508677A (en) Conjoint vulnerability identifiers
CN106911694A (en) A kind of method automatically updated based on ANDROID leak knowledge bases
CN107609179A (en) A kind of data processing method and equipment
CN112822210B (en) Vulnerability management system based on network assets
US20210081541A1 (en) Vulnerability state report
CN113065943A (en) Anti-fraud black product entity identification method and system
CN114528448B (en) Accurate analytic system of drawing of portrait of global foreign trade customer
CN110928942A (en) Index data monitoring and management method and device
CN105791310A (en) Network intrusion event monitoring method and device
CN115408672A (en) Deep early warning method, device, equipment and storage medium for blacklist
CN106649343B (en) Network data information processing method and equipment
CN114090076A (en) Method and device for judging compliance of application program
CN108965254A (en) One kind being used for government website security protection scheme
Nakamura Towards unified vulnerability assessment with open data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601