CN105635121A - Vulnerability severity level distribution statistical method based on manufacturers, device and system - Google Patents
Vulnerability severity level distribution statistical method based on manufacturers, device and system Download PDFInfo
- Publication number
- CN105635121A CN105635121A CN201510977769.3A CN201510977769A CN105635121A CN 105635121 A CN105635121 A CN 105635121A CN 201510977769 A CN201510977769 A CN 201510977769A CN 105635121 A CN105635121 A CN 105635121A
- Authority
- CN
- China
- Prior art keywords
- security breaches
- leak
- list
- network
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a vulnerability severity level distribution statistical method based on manufacturers, a device and a system. The method comprises the following steps: according to a vulnerability issuance website list, periodically scanning to obtain the latest security vulnerabilities, forming a latest network vulnerability list and storing the latest network vulnerability list to a database; acquiring the latest network vulnerability list stored in the database, identifying the security vulnerabilities in the latest network vulnerability list according to a predetermined rule, thereby sorting the security vulnerabilities and appointing development manufactures corresponding to the security vulnerabilities; according to severity levels of the identified security vulnerabilities and corresponding extent of generated security influence, generating a weighted severity level score for each security vulnerability in the latest network vulnerability list, performing statistics through different time dimensions, and finally obtaining a ranking of security vulnerability levels of the development manufactures corresponding to the network vulnerabilities; and according to the ranking of security vulnerability severity levels, informing corresponding development manufactures according to a ranking order to solve corresponding security vulnerabilities.
Description
Technical field
The present invention relates to technical field of network security, more particularly, to a kind of based on the leak menace level distribution statistical method of manufacturer, device and system.
Background technology
, the data combing mending sky leak response platform is found a few days ago, between 12 months of in April, 2014 in March, 2015, mend effective University Websites leak of display on balance table and, up to 3495, relate to University Websites 1088. Wherein, high-risk leak 2611, account for 74.7%; Middle danger leak 691, accounts for 19.8%; Low danger leak 193, accounts for 5.5%.
And it is a concern that between 1 year in the past, it is being apprised of after website exists leak, the University Websites of meeting patching bugs only has 35, only 186 leaks are repaired, and the University Websites of 96.8% ignores the existence of security breaches completely, and the University Websites security breaches of 94.6% are not repaired.
The network security problem of education network is so severe, is badly in need of solving as early as possible.
Summary of the invention
In order to solve the problems referred to above, the present invention proposes a kind of based on the leak menace level distribution statistical method of manufacturer, device and system. The method by a leak found is carried out class indication, can indicate affiliated manufacturer, thus obtaining the weighted scoring ranking of application vendor, assisted network safety officer links up patching bugs with manufacturer, improves the overall security of network application.
According to an aspect of the present invention, which providing a kind of leak based on manufacturer and seriously register distribution statistical method, the method includes the steps of:
Step S1, regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Step S2, according to described leak issuing web site list, periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Step S3, obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list is identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Step S4, menace level according to the security breaches identified and to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Step S5, according to described security breaches menace level ranking, according to ranking successively notice, corresponding development company solves corresponding security breaches.
According to a further aspect of the invention, which provide a kind of leak based on manufacturer and seriously register distribution statistics device, including:
Leak delivery network list acquisition module, it regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Up-to-date security scan module, it is according to described leak issuing web site list, and periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Security breaches mark module, it obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list are identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Grade scoring module, it is according to the menace level of the security breaches identified with to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Leak solves notification module, and it is according to described security breaches menace level ranking, and according to ranking sequencing notice, corresponding development company solves corresponding security breaches.
According to a third aspect of the present invention, which providing a kind of leak menace level distribution statistical system based on manufacturer, this system includes: network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server; Wherein:
Described network hole acquisition server for according to leak issuing web site list, gathers the security breaches that network is up-to-date automatically, and is saved in described cyberspace vulnerability database server after being organized into network hole list;
Described network hole mark system, it is responsible for the described network hole list collected is processed, and specifically comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, manufacturer's leak statistics, user's leak statistics, mail management.
The present invention, by analyzing the safety loophole information that each security website comes out, identifies manufacturer belonging to leak, and the leak menace level exposed by manufacturer belonging to networking products is collected, and carries out the management of manufacturer's security breaches. System contains the vulnerability information based on the scanning HTTP page and captures server, leak mark and analysis system server and database server composition. After obtaining vulnerability information and completing mark work, using the analytic statistics result network security management foundation as network software provider.
Accompanying drawing explanation
Fig. 1 illustrates the leak menace level distribution statistical method flow chart based on manufacturer of the present invention;
Fig. 2 illustrates the structural framing figure of the leak menace level distribution statistical system based on manufacturer of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in further detail.
As it is shown in figure 1, the present invention proposes a kind of leak menace level distribution statistical method based on manufacturer, the method includes the steps of:
Step S1, obtains leak issuing web site list, is used for being supplied to leak acquisition server standby.
The list of leak issuing web site described in step according to certain automatic generation, or can regularly be arranged by safety manager and obtain; Described leak issuing web site list includes more emerging vulnerability informations and associated description.
Step S2, by leak acquisition server according to described leak issuing web site list, the vulnerability information of each website orientation in leak issuing web site list described in periodic scanning, and after obtaining up-to-date vulnerability information, it is organized into the latest network leak list of predetermined format, is saved in data base.
In above-mentioned steps S2, the associated description of the vulnerability information that system is issued according to the website in described leak issuing web site list, there is unit or the school of corresponding vulnerability information in auto-associating, and associates the branch company's (being in charge of described unit or the branch company of school eduaction net) belonging to described unit or school and great Qu information. Described leak is also carried out preliminary classification by this system;
Step S3, the relevant information of leak, for obtaining the latest network leak list of storage in data base, is identified by network hole mark system according to pre-defined rule, is classified by network hole and specifies corresponding development company. Described mark can be automatic mark, it is also possible to be manager manual identification, or both combinations.
Before carrying out step S3, system can the menace level of leak in first latest network leak list according to data base be ranked up, and leak ranking that is more serious and that have considerable influence is front. In pending list, network security manager needs the vulnerability information that priority treatment menace level is higher, and the affiliated manufacturer finding leak software is identified.
In step s3, it is necessary to identify following content successively:
Leak type: such as struts2 leak, DDos attacks, and SQL injects, web back door etc.
Leak menace level: minimum 1 grade, the highest 10 grades.
Affiliated manufacturer: the development company of the Web software of leak occurs, if not commercial product, is designated as owning user unit or school.
Affiliated branch company: occur the belonging network of the URL correspondence user of leak to run branch company.
Step S4, affects according to leak menace level and security breaches, generates the scoring of weighting menace level, then with every day, weekly, 30 days, quarterly, the different time dimension such as annual add up, obtain the security breaches menace level TOPN ranking of development company.
Weighted scoring described in step S4, is judged by attribute synthesis such as leak menace level, leak website or product access times, unresolved times.
Step S5, according to security breaches menace level ranking, the development company more serious according to the safety problem of ranking sequencing contact solves leak problem, and for not having the leak of success flag development company, the Subscriber Unit corresponding by the contact of network operation branch company or school solve.
As in figure 2 it is shown, the invention allows for a kind of leak menace level distribution statistical system based on manufacturer, this system includes network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server. Wherein:
Described network hole acquisition server is for according to the leak issuing web site list preset, automatically gathering cyberspace vulnerability information, form network hole list. This system is always according to associated description about the complete leak of network in described network hole list, described leak is carried out preliminary classification coupling, indicate the vulnerability informations such as leak type, source address, affiliated unit or school, affiliated branch company, affiliated great Qu, and described network hole list is saved in data base.
Described network hole mark system, is responsible for the network hole list collected is processed, and comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, the function such as manufacturer's leak statistics, user's leak statistics, mail management. System is made up of Web service and DB database service, and data are saved in data base, and manager is identified work on Web system services, and as statistics show surroundings.
In described network hole mark system, user's management comprises all Subscriber Units and the school information of system administration.
Manufacturer manages, and comprises the information of network software provider. And manufacturer's information also comprises the software matrix that manufacturer provides, conveniently carries out matching identification.
Security breaches identification function, is operated by network security manager, verifies the vulnerability information in described network hole list, and the source identifying vulnerability information is the information such as affiliated branch company, affiliated manufacturer, menace level, leak type.
Security breaches are added up, and using leak itself as index, a situation arises for the leak in statistics stipulated time section, and the occurrence frequency of various leaks is added up.
Manufacturer's leak statistics, the untreated leak situation of statistics manufacturer. Ranking can be carried out according to weighted scoring.
The present invention, by analyzing the safety loophole information that each security website comes out, identifies manufacturer belonging to leak, and the leak menace level exposed by manufacturer belonging to networking products is collected, and carries out the management of manufacturer's security breaches. System contains the vulnerability information based on the scanning HTTP page and captures server, leak mark and analysis system server and database server composition. After obtaining vulnerability information and completing mark work, using the analytic statistics result network security management foundation as network software provider.
Particular embodiments described above; the purpose of the present invention, technical scheme and beneficial effect have been further described; it is it should be understood that; the foregoing is only specific embodiments of the invention; it is not limited to the present invention; all within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.
Claims (10)
1. the leak based on manufacturer seriously registers distribution statistical method, it is characterised in that the method includes the steps of:
Step S1, regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Step S2, according to described leak issuing web site list, periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Step S3, obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list is identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Step S4, menace level according to the security breaches identified and to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Step S5, according to described security breaches menace level ranking, according to ranking successively notice, corresponding development company solves corresponding security breaches.
2. the method for claim 1, wherein, step S2 also includes the up-to-date security breaches obtained according to scanning, there is unit or the school of corresponding security breaches in auto-associating, and associate the network operation branch company at described unit or school place and affiliated great Qu information, also described up-to-date security breaches are carried out preliminary classification simultaneously.
3. the method for claim 1, wherein described security breaches are identified specifically including by step S3:
Identify the type of described security breaches;
Identify the menace level of described security breaches;
Identify the development company described in described security breaches;
Mark occurs network linking correspondence user's belonging network of described security breaches to run branch company.
4. the method for claim 1, wherein the scoring of described weighting menace level is weighted comprehensive grading according to leak menace level, leak website or product access times, unresolved time.
5. the leak based on manufacturer seriously registers distribution statistics device, it is characterised in that including:
Leak delivery network list acquisition module, it regularly arranges leak issuing web site list, it is provided that standby to leak acquisition server; Described leak issuing web site list includes the list of websites issuing security breaches;
Up-to-date security scan module, it is according to described leak issuing web site list, and periodic scanning obtains up-to-date security breaches, is saved in data base after forming latest network leak list;
Security breaches mark module, it obtains the described latest network leak list of storage in data base, according to pre-defined rule, the security breaches in described latest network leak list are identified, with the development company being undertaken classifying and specify described security breaches corresponding by described security breaches;
Grade scoring module, it is according to the menace level of the security breaches identified with to produced security implication size, each security breaches in described latest network leak list are generated the scoring of weighting menace level, and add up with different time dimensions, the final security breaches grade ranking obtaining development company corresponding to network hole;
Leak solves notification module, and it is according to described security breaches menace level ranking, and according to ranking sequencing notice, corresponding development company solves corresponding security breaches.
6. device as claimed in claim 5, wherein, the up-to-date security breaches that up-to-date security scan module obtains always according to scanning, there is unit or the school of corresponding security breaches in auto-associating, and associate the network operation branch company at described unit or school place and affiliated great Qu information, also described up-to-date security breaches are carried out preliminary classification simultaneously.
7. device as claimed in claim 5, wherein, described security breaches are identified specifically including by security breaches mark module:
Identify the type of described security breaches;
Identify the menace level of described security breaches;
Identify the development company described in described security breaches;
Mark occurs network linking correspondence user's belonging network of described security breaches to run branch company.
8. device as claimed in claim 5, wherein, the scoring of described weighting menace level is weighted comprehensive grading according to leak menace level, leak website or product access times, unresolved time.
9. the leak menace level distribution statistical system based on manufacturer, it is characterised in that this system includes: network hole acquisition server, network hole mark system WEB server, cyberspace vulnerability database server; Wherein:
Described network hole acquisition server for according to leak issuing web site list, gathers the security breaches that network is up-to-date automatically, and is saved in described cyberspace vulnerability database server after being organized into network hole list;
Described network hole mark system, it is responsible for the described network hole list collected is processed, and specifically comprises user's management, manufacturer's management, security breaches mark, security breaches statistics, manufacturer's leak statistics, user's leak statistics, mail management.
10. system as claimed in claim 9, wherein, described user management includes all Subscriber Units and the school information of system administration; Manufacturer's management includes the information of network software provider, the software matrix that manufacturer provides; Security breaches mark includes identifying branch company, affiliated manufacturer, menace level and leak type described in the security breaches in described network hole list; Security breaches statistics includes the situation that in statistics predetermined amount of time, security breaches occur, and the occurrence frequency of various security breaches is added up; Manufacturer's leak statistics includes the situation of the untreated security breaches of statistics manufacturer, according to weighted scoring, manufacturer is carried out ranking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510977769.3A CN105635121A (en) | 2015-12-23 | 2015-12-23 | Vulnerability severity level distribution statistical method based on manufacturers, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510977769.3A CN105635121A (en) | 2015-12-23 | 2015-12-23 | Vulnerability severity level distribution statistical method based on manufacturers, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105635121A true CN105635121A (en) | 2016-06-01 |
Family
ID=56049612
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510977769.3A Pending CN105635121A (en) | 2015-12-23 | 2015-12-23 | Vulnerability severity level distribution statistical method based on manufacturers, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105635121A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453386A (en) * | 2016-11-09 | 2017-02-22 | 深圳市魔方安全科技有限公司 | Automatic internet asset monitoring and risk detecting method based on distributed technology |
CN108228713A (en) * | 2017-12-01 | 2018-06-29 | 中国电子科技集团公司电子科学研究院 | Loophole base construction method, device, vulnerability database and computer readable storage medium |
CN108985068A (en) * | 2018-06-26 | 2018-12-11 | 广东电网有限责任公司信息中心 | Loophole quick sensing, positioning and the method and system of verifying |
CN109690492A (en) * | 2016-07-29 | 2019-04-26 | 摩根大通银行国家协会 | Cyberspace vulnerability management system and method |
CN110768977A (en) * | 2019-10-21 | 2020-02-07 | 中国民航信息网络股份有限公司 | Method and system for capturing security vulnerability information |
CN111277555A (en) * | 2018-12-05 | 2020-06-12 | 中国移动通信集团河南有限公司 | Vulnerability false alarm screening method and device |
CN111865927A (en) * | 2020-06-24 | 2020-10-30 | 平安普惠企业管理有限公司 | Vulnerability processing method and device based on system, computer equipment and storage medium |
CN112069503A (en) * | 2020-08-05 | 2020-12-11 | 长沙市到家悠享网络科技有限公司 | Task management method, device and storage medium |
CN112286571A (en) * | 2020-09-25 | 2021-01-29 | 长沙市到家悠享网络科技有限公司 | Vulnerability repairing method and device and storage medium |
CN114186236A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN114186235A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN115102751A (en) * | 2022-06-17 | 2022-09-23 | 西安热工研究院有限公司 | Method for testing capability of safety service manufacturer |
CN116561769A (en) * | 2023-05-19 | 2023-08-08 | 国家计算机网络与信息安全管理中心 | Vendor recommendation method, device, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102354310A (en) * | 2011-07-12 | 2012-02-15 | 广东电网公司信息中心 | Method and system for automated information security evaluation |
CN104618178A (en) * | 2014-12-29 | 2015-05-13 | 北京奇虎科技有限公司 | Website bug online evaluation method and device |
CN104836855A (en) * | 2015-04-30 | 2015-08-12 | 国网四川省电力公司电力科学研究院 | Web application safety situation assessment system based on multi-source data fusion |
-
2015
- 2015-12-23 CN CN201510977769.3A patent/CN105635121A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102354310A (en) * | 2011-07-12 | 2012-02-15 | 广东电网公司信息中心 | Method and system for automated information security evaluation |
CN104618178A (en) * | 2014-12-29 | 2015-05-13 | 北京奇虎科技有限公司 | Website bug online evaluation method and device |
CN104836855A (en) * | 2015-04-30 | 2015-08-12 | 国网四川省电力公司电力科学研究院 | Web application safety situation assessment system based on multi-source data fusion |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109690492A (en) * | 2016-07-29 | 2019-04-26 | 摩根大通银行国家协会 | Cyberspace vulnerability management system and method |
CN109690492B (en) * | 2016-07-29 | 2023-09-29 | 摩根大通银行国家协会 | Network security vulnerability management system and method |
CN106453386A (en) * | 2016-11-09 | 2017-02-22 | 深圳市魔方安全科技有限公司 | Automatic internet asset monitoring and risk detecting method based on distributed technology |
CN108228713A (en) * | 2017-12-01 | 2018-06-29 | 中国电子科技集团公司电子科学研究院 | Loophole base construction method, device, vulnerability database and computer readable storage medium |
CN108985068A (en) * | 2018-06-26 | 2018-12-11 | 广东电网有限责任公司信息中心 | Loophole quick sensing, positioning and the method and system of verifying |
CN111277555B (en) * | 2018-12-05 | 2022-03-11 | 中国移动通信集团河南有限公司 | Vulnerability false alarm screening method and device |
CN111277555A (en) * | 2018-12-05 | 2020-06-12 | 中国移动通信集团河南有限公司 | Vulnerability false alarm screening method and device |
CN110768977A (en) * | 2019-10-21 | 2020-02-07 | 中国民航信息网络股份有限公司 | Method and system for capturing security vulnerability information |
CN110768977B (en) * | 2019-10-21 | 2022-02-25 | 中国民航信息网络股份有限公司 | Method and system for capturing security vulnerability information |
CN111865927B (en) * | 2020-06-24 | 2024-04-05 | 天翼安全科技有限公司 | Vulnerability processing method and device based on system, computer equipment and storage medium |
CN111865927A (en) * | 2020-06-24 | 2020-10-30 | 平安普惠企业管理有限公司 | Vulnerability processing method and device based on system, computer equipment and storage medium |
CN112069503A (en) * | 2020-08-05 | 2020-12-11 | 长沙市到家悠享网络科技有限公司 | Task management method, device and storage medium |
CN112286571A (en) * | 2020-09-25 | 2021-01-29 | 长沙市到家悠享网络科技有限公司 | Vulnerability repairing method and device and storage medium |
CN114186235A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN114186236B (en) * | 2022-02-17 | 2022-05-27 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN114186236A (en) * | 2022-02-17 | 2022-03-15 | 北京搜狐新媒体信息技术有限公司 | Security vulnerability processing method and device |
CN115102751A (en) * | 2022-06-17 | 2022-09-23 | 西安热工研究院有限公司 | Method for testing capability of safety service manufacturer |
CN115102751B (en) * | 2022-06-17 | 2023-09-15 | 西安热工研究院有限公司 | Method for checking capability of security service manufacturer |
CN116561769A (en) * | 2023-05-19 | 2023-08-08 | 国家计算机网络与信息安全管理中心 | Vendor recommendation method, device, equipment and storage medium |
CN116561769B (en) * | 2023-05-19 | 2024-05-14 | 国家计算机网络与信息安全管理中心 | Vendor recommendation method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105635121A (en) | Vulnerability severity level distribution statistical method based on manufacturers, device and system | |
US10248730B2 (en) | Statistical method and apparatus for webpage access data | |
CA3066493A1 (en) | System and method for a vendor risk management platform | |
Borthakur et al. | How well are we managing E-waste in India: evidences from the city of Bangalore | |
CN108712426A (en) | Reptile recognition methods and system a little are buried based on user behavior | |
CN103455758A (en) | Method and device for identifying malicious website | |
CN106878316B (en) | Risk quantification method and device | |
CN111859234A (en) | Illegal content identification method and device, electronic equipment and storage medium | |
CN115314276B (en) | Security check management system, method and terminal equipment | |
CN112422574A (en) | Risk account identification method, device, medium and electronic equipment | |
de Faria et al. | The determinants mostly disclosed by companies that are members of the Carbon Disclosure Project | |
CN104508677A (en) | Conjoint vulnerability identifiers | |
CN106911694A (en) | A kind of method automatically updated based on ANDROID leak knowledge bases | |
CN107609179A (en) | A kind of data processing method and equipment | |
CN112822210B (en) | Vulnerability management system based on network assets | |
US20210081541A1 (en) | Vulnerability state report | |
CN113065943A (en) | Anti-fraud black product entity identification method and system | |
CN114528448B (en) | Accurate analytic system of drawing of portrait of global foreign trade customer | |
CN110928942A (en) | Index data monitoring and management method and device | |
CN105791310A (en) | Network intrusion event monitoring method and device | |
CN115408672A (en) | Deep early warning method, device, equipment and storage medium for blacklist | |
CN106649343B (en) | Network data information processing method and equipment | |
CN114090076A (en) | Method and device for judging compliance of application program | |
CN108965254A (en) | One kind being used for government website security protection scheme | |
Nakamura | Towards unified vulnerability assessment with open data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160601 |