CN106845244A - A kind of detection method and device - Google Patents
A kind of detection method and device Download PDFInfo
- Publication number
- CN106845244A CN106845244A CN201611178967.4A CN201611178967A CN106845244A CN 106845244 A CN106845244 A CN 106845244A CN 201611178967 A CN201611178967 A CN 201611178967A CN 106845244 A CN106845244 A CN 106845244A
- Authority
- CN
- China
- Prior art keywords
- safety detection
- detection project
- project
- security baseline
- configuration item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Abstract
The invention provides a kind of detection method and device, wherein, methods described includes:S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding security baseline;S2:Obtain the configuration information of computer system to be detected;S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;S4:Detect whether corresponding configuration item reaches the corresponding security baseline of presently described safety detection project to each described safety detection project respectively.The technical scheme provided by the present invention, can improve detection efficiency.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of detection method and device.
Background technology
In recent years, information security events take place frequently, and information security is increasingly valued by people.Security baseline refers to meter
In calculation machine system (such as, operating system and application program), the minimalist configuration that security-related configuration item should reach.
At present, before each computer system is reached the standard grade, it usually needs manually verify its security-related each and match somebody with somebody
Item is put, to detect whether each configuration item reaches security baseline, detection efficiency is extremely low.
The content of the invention
A kind of detection method and device are the embodiment of the invention provides, detection efficiency can be improved.
In a first aspect, the invention provides a kind of detection method, including:
S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding peace
Full baseline;
S2:Obtain the configuration information of computer system to be detected;
S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
S4:Detect whether corresponding configuration item reaches presently described safety detection to each described safety detection project respectively
The corresponding security baseline of project.
Preferably,
In described each described safety detection project of detection, whether corresponding configuration item reaches presently described safety respectively
After the corresponding security baseline of detection project, also include:
When at least one safety detection project, there is the corresponding configuration item of at least one target detection project
When being not reaching to the corresponding security baseline, using the corresponding security baseline of at least one target detection project and
The configuration item generates alarm information, and provides the alarm information.
Preferably,
At least one safety detection project, including:One in key form, software environment and network environment or
It is multiple.
Preferably,
When at least one safety detection project include the key form when, the setting each it is described safety inspection
Survey project distinguishes corresponding security baseline, including:The corresponding key length of the key form, key rule of combination are set;
And/or,
When at least one safety detection project include the software environment when, the setting each it is described safety inspection
Survey project distinguishes corresponding security baseline, including:The software name of the corresponding at least one sample software of the software environment is set
Claim;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection
Mesh distinguishes corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
Second aspect, the embodiment of the invention provides a kind of detection means, including:
Setup module, for determining at least one safety detection project, and sets each described safety detection project point
Not corresponding security baseline;
Acquisition module, the configuration information for obtaining computer system to be detected;
Parsing module, it is corresponding to obtain each described safety detection project difference for parsing the configuration information
Configuration item;
Detection module, for detecting whether corresponding configuration item reaches current institute to each described safety detection project respectively
State the corresponding security baseline of safety detection project.
Preferably,
Processing module, for when at least one safety detection project, there is at least one target detection project pair
It is corresponding using at least one target detection project when configuration item answered is not reaching to the corresponding security baseline
The security baseline and configuration item generation alarm information, and the alarm information is provided.
Preferably,
At least one safety detection project, including:One in key form, software environment and network environment or
It is multiple.
Preferably,
The setup module, for when at least one safety detection project includes the key form, setting institute
State the corresponding key length of key form, key rule of combination;And/or, when at least one safety detection project includes institute
When stating software environment, the dbase of the corresponding at least one sample software of the software environment is set;And/or, when it is described extremely
When a few safety detection project includes network environment, the corresponding network address sampling interval of the network environment is set.
A kind of detection method and device are the embodiment of the invention provides, in the method, it is determined that at least one safety inspection
Survey project, and set after each safety detection project distinguishes corresponding security baseline, you can obtain department of computer science to be detected
The configuration information of system, parses by the configuration information for obtaining, corresponding to obtain each safety detection project difference
Configuration item, you can detect whether corresponding configuration item reaches current safety detection project correspondence to each safety detection project respectively
Security baseline.It can be seen that, in technical scheme provided in an embodiment of the present invention, it is no longer necessary to manually verify computer system to be detected
Each configuration item, you can detect whether corresponding configuration item reaches corresponding safe base in computer system to be detected
Line, can improve detection efficiency.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of detection method that one embodiment of the invention is provided;
Fig. 2 is the flow chart of another detection method that one embodiment of the invention is provided;
Fig. 3 is a kind of structure chart of detection means that one embodiment of the invention is provided;
Fig. 4 is the structure chart of another detection means that one embodiment of the invention is provided.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments, based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained on the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, a kind of detection method is the embodiment of the invention provides, including:
S1:Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding peace
Full baseline;
S2:Obtain the configuration information of computer system to be detected;
S3:The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
S4:Detect whether corresponding configuration item reaches presently described safety detection to each described safety detection project respectively
The corresponding security baseline of project.
In the above embodiment of the present invention, it is determined that at least one safety detection project, and each safety detection is set
Mesh is distinguished after corresponding security baseline, you can obtain the configuration information of computer system to be detected, by the configuration to obtaining
Information is parsed, and distinguishes corresponding configuration item to obtain each safety detection project, you can detect each safety detection
Whether corresponding configuration item reaches the corresponding security baseline of current safety detection project to project respectively.It can be seen that, the embodiment of the present invention
In the technical scheme of offer, it is no longer necessary to manually verify each configuration item of computer system to be detected, you can detect and treat
Whether corresponding configuration item reaches corresponding security baseline in detection computer system, can improve detection efficiency.
It should be appreciated that computer system to be measured includes corresponding operating system or application program.
In one embodiment of the invention, at least one safety detection project, including but not limited to key form, software
One or more in environment and network environment.
Further, for convenience staff to being not reaching to the configuration of corresponding security baseline in computer system to be measured
Item is modified, and in one embodiment of the invention, in the detection, each described safety detection project distinguishes corresponding configuration
Whether item is reached after the corresponding security baseline of presently described safety detection project, is also included:
When at least one safety detection project, there is the corresponding configuration item of at least one target detection project
When being not reaching to the corresponding security baseline, using the corresponding security baseline of at least one target detection project and
The configuration item generates alarm information, and provides the alarm information.
For example, when safety detection project includes key form, if correspondence in detecting computer system to be measured
The configuration item of key form is:AAABBBBBB, the corresponding security baseline of key form is AAABBBCCC, characterizes key combination rule
It is then:3 big numerals of lowercase+2 of minuscule+3 or symbol, the corresponding configuration item of key form is:AAABBBBBB,
Characterizing key rule of combination is ,+6 lowercases of 3 big minuscules, wherein, A characterizes capitalization, and B characterizes lowercase, C
Characterize data or character;It can be seen that, in computer system to be measured, the corresponding configuration item of key form does not reach corresponding safety
Baseline.Therefore, using configuration item AAABBBBBB and security baseline AAABBBCCC generation warning information, staff can be facilitated to lead to
The configuration item AAABBBBBB and security baseline AAABBBCCC carried in contrast warning information are crossed, will be secret in computer system to be measured
Last three of the corresponding configuration item AAABBBBBB of key form are revised as CCC.
It is described when at least one safety detection project includes the key form in one embodiment of the invention
Each described safety detection project is set and distinguishes corresponding security baseline, including:The corresponding key of the key form is set
Length, key rule of combination;
And/or,
When at least one safety detection project include the software environment when, the setting each it is described safety inspection
Survey project distinguishes corresponding security baseline, including:The software name of the corresponding at least one sample software of the software environment is set
Claim;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection
Mesh distinguishes corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
For example, by software environment it is corresponding simply dbase for sample software includes a, b, c when, if obtained
Get in computer system to be measured, the corresponding configuration item of software environment is a, b, then illustrate that the corresponding configuration item of software environment does not have
Corresponding security baseline is reached, when utilizing sample dbase a, b, c, and configuration item a, b to generate warning information and provide,
Staff can modify to configuration item, specifically, such as installing sample software c in computer systems to realize treating
Survey in computer system, the corresponding configuration item of software environment is revised as a, b, c from a, b.
And for example, network address sampling interval is set to:123.115.102.197~123.115.255.197, when to be measured
In computer system, when the network address of map network environment is 123.115.101.197, then illustrates that network environment is corresponding and match somebody with somebody
Put item and be not reaching to corresponding security baseline.
In order to more clearly illustrate the technical scheme and advantage of the embodiment of the present invention, lower mask body is detecting calculating to be measured
As a example by whether the corresponding configuration item of key form meets corresponding security baseline in machine system, as shown in Fig. 2 can include as follows
Each step:
Step 201, determines at least one safety detection project, and set the corresponding peace of each safety detection project difference
Full baseline.
In the embodiment of the present invention, safety detection project includes but is not limited to key form, software environment and network environment
In one or more, following each step clothes made of brocade safety detection project of the embodiment of the present invention are included as a example by key form.
In the embodiment of the present invention, the security baseline of key form is set, including sets the corresponding key combination of key form
Rule and key length etc..For example, the corresponding security baseline of key form can be set to AxxBxxCxx, is characterized secret
Key length is 9, and key rule of combination is to include at least one capitalization, a lowercase and a data or symbol,
Wherein, A characterizes capitalization, and B characterizes lowercase, C characterize datas or character.
Step 202, obtains the configuration information of computer system to be detected.
Step 203, parses the configuration information for obtaining, to obtain the corresponding configuration item of key form.
In the embodiment of the present invention, here so that the configuration item for obtaining is AxxBxxxxx as an example.
Whether step 204, detection configuration item AxxBxxxxx reaches security baseline AxxBxxCxx.
In the embodiment of the present invention, by comparing configuration item AxxBxxxxx and security baseline AxxBxxCxx, it is not difficult to find out, matches somebody with somebody
The corresponding length of item is put to lack character or numeral in 9, but configuration item, accordingly, it can be determined that go out configuration item AxxBxxxxx not having
Reach security baseline AxxBxxCxx.
Step 205, using configuration item AxxBxxxxx and security baseline AxxBxxCxx generation warning information, and provides.
In the embodiment of the present invention, staff can be facilitated by contrasting the configuration item AxxBxxxxx carried in warning information
With security baseline AxxBxxCxx, the corresponding configuration item AxxBxxxxx of key form in computer system to be measured is revised as
AxxBxxCxx。
As shown in figure 3, a kind of detection means is the embodiment of the invention provides, including:
Setup module 301, for determining at least one safety detection project, and sets each described safety detection project
The corresponding security baseline of difference;
Acquisition module 302, the configuration information for obtaining computer system to be detected;
Parsing module 303, for parsing the configuration information, is corresponded to respectively with obtaining each described safety detection project
Configuration item;
Detection module 304, for detect each described safety detection project respectively corresponding configuration item whether reach work as
The corresponding security baseline of the preceding safety detection project.
Further, for convenience staff to being not reaching to the configuration of corresponding security baseline in computer system to be measured
Item is modified, as shown in figure 4, in one embodiment of the invention, also including:Processing module 401, for when described at least one
In safety detection project, there is the corresponding configuration item of at least one target detection project and be not reaching to the corresponding safety
During baseline, disappeared using the corresponding security baseline of at least one target detection project and configuration item generation alarm
Breath, and the alarm information is provided.
In one embodiment of the invention, at least one safety detection project, including:Key form, software environment with
And one or more in network environment.
In one embodiment of the invention, the setup module 301, for including when at least one safety detection project
During the key form, the corresponding key length of the key form, key rule of combination are set;And/or, when described at least one
When individual safety detection project includes the software environment, the software of the corresponding at least one sample software of the software environment is set
Title;And/or, when at least one safety detection project includes network environment, the corresponding net of the network environment is set
Network address sampling interval.
The contents such as the information exchange between each unit, implementation procedure in said apparatus, due to implementing with the inventive method
Example is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
In sum, each embodiment of the invention at least has the advantages that:
1st, in one embodiment of the invention, it is determined that at least one safety detection project, and each safety detection is set
Mesh is distinguished after corresponding security baseline, you can obtain the configuration information of computer system to be detected, by the configuration to obtaining
Information is parsed, and distinguishes corresponding configuration item to obtain each safety detection project, you can detect each safety detection
Whether corresponding configuration item reaches the corresponding security baseline of current safety detection project to project respectively.It can be seen that, the embodiment of the present invention
In the technical scheme of offer, it is no longer necessary to manually verify each configuration item of computer system to be detected, you can detect and treat
Whether corresponding configuration item reaches corresponding security baseline in detection computer system, can improve detection efficiency.
2nd, in one embodiment of the invention, exist the corresponding configuration item of at least one target detection project be not reaching to it is corresponding
During security baseline, using the corresponding security baseline of at least one target detection project and configuration item generation alarm information, and provide
Alarm information, can facilitate staff to repair the configuration item that corresponding security baseline is not reaching in computer system to be measured
Change.
It should be noted that herein, such as first and second etc relational terms are used merely to an entity
Or operation makes a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating
Any this actual relation or order.And, term " including ", "comprising" or its any other variant be intended to it is non-
It is exclusive to include, so that process, method, article or equipment including a series of key elements not only include those key elements,
But also other key elements including being not expressly set out, or also include by this process, method, article or equipment are solid
Some key elements.In the absence of more restrictions, the key element limited by sentence " including ", does not arrange
Except also there is other identical factor in the process including the key element, method, article or equipment.
It is last it should be noted that:Presently preferred embodiments of the present invention is the foregoing is only, skill of the invention is merely to illustrate
Art scheme, is not intended to limit the scope of the present invention.All any modifications made within the spirit and principles in the present invention,
Equivalent, improvement etc., are all contained in protection scope of the present invention.
Claims (8)
1. a kind of detection method, it is characterised in that including:
Determine at least one safety detection project, and set each described safety detection project to distinguish corresponding security baseline;
Obtain the configuration information of computer system to be detected;
The configuration information is parsed, corresponding configuration item is distinguished to obtain each described safety detection project;
Detect whether corresponding configuration item reaches presently described safety detection project pair to each described safety detection project respectively
The security baseline answered.
2. detection method according to claim 1, it is characterised in that
In described each described safety detection project of detection, whether corresponding configuration item reaches presently described safety detection respectively
After the corresponding security baseline of project, also include:
Do not have when at least one safety detection project, there is the corresponding configuration item of at least one target detection project
When reaching the corresponding security baseline, using the corresponding security baseline of at least one target detection project and described
Configuration item generates alarm information, and provides the alarm information.
3. detection method according to claim 1, it is characterised in that
At least one safety detection project, including:One or many in key form, software environment and network environment
It is individual.
4. detection method according to claim 3, it is characterised in that
When at least one safety detection project includes the key form, the setting each described safety detection
Mesh distinguishes corresponding security baseline, including:The corresponding key length of the key form, key rule of combination are set;
And/or,
When at least one safety detection project includes the software environment, the setting each described safety detection
Mesh distinguishes corresponding security baseline, including:The dbase of the corresponding at least one sample software of the software environment is set;
And/or,
When at least one safety detection project includes network environment, the setting each described safety detection project point
Not corresponding security baseline, including:The corresponding network address sampling interval of the network environment is set.
5. a kind of detection means, it is characterised in that including:
Setup module, for determining at least one safety detection project, and it is right respectively to set each described safety detection project
The security baseline answered;
Acquisition module, the configuration information for obtaining computer system to be detected;
Parsing module, for parsing the configuration information, corresponding configuration is distinguished to obtain each described safety detection project
;
Detection module, for detecting whether corresponding configuration item reaches presently described peace to each described safety detection project respectively
The corresponding security baseline of full detection project.
6. detection means according to claim 5, it is characterised in that
Processing module, for when at least one safety detection project, there is at least one target detection project corresponding
It is corresponding described using at least one target detection project when configuration item is not reaching to the corresponding security baseline
Security baseline and configuration item generation alarm information, and the alarm information is provided.
7. where basis requires the detection means described in 6, it is characterised in that
At least one safety detection project, including:One or many in key form, software environment and network environment
It is individual.
8. detection means according to claim 7, it is characterised in that
The setup module, for when at least one safety detection project includes the key form, setting described secret
The corresponding key length of key form, key rule of combination;And/or, when at least one safety detection project is including described soft
During part environment, the dbase of the corresponding at least one sample software of the software environment is set;And/or, when described at least one
When individual safety detection project includes network environment, the corresponding network address sampling interval of the network environment is set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611178967.4A CN106845244A (en) | 2016-12-19 | 2016-12-19 | A kind of detection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611178967.4A CN106845244A (en) | 2016-12-19 | 2016-12-19 | A kind of detection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106845244A true CN106845244A (en) | 2017-06-13 |
Family
ID=59140753
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611178967.4A Pending CN106845244A (en) | 2016-12-19 | 2016-12-19 | A kind of detection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845244A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109582387A (en) * | 2018-11-26 | 2019-04-05 | 郑州云海信息技术有限公司 | Service recognition methods and the device of class baseline project |
CN110008711A (en) * | 2019-04-15 | 2019-07-12 | 苏州浪潮智能科技有限公司 | A kind of security baseline detection method, device, equipment and readable storage medium storing program for executing |
CN114629690A (en) * | 2022-02-24 | 2022-06-14 | 广东电网有限责任公司 | Equipment safety baseline compliance detection method and device and computer equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103414585A (en) * | 2013-08-01 | 2013-11-27 | 华南师范大学 | Method and device for building safety baselines of service system |
CN103746988A (en) * | 2013-12-31 | 2014-04-23 | 曙光云计算技术有限公司 | Security management method and system of cloud host machine |
CN104125197A (en) * | 2013-04-24 | 2014-10-29 | 阿里巴巴集团控股有限公司 | Security baseline system and method thereof for implementing security checks |
CN106055984A (en) * | 2016-05-27 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Classified management method applied to security baseline software |
-
2016
- 2016-12-19 CN CN201611178967.4A patent/CN106845244A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125197A (en) * | 2013-04-24 | 2014-10-29 | 阿里巴巴集团控股有限公司 | Security baseline system and method thereof for implementing security checks |
CN103414585A (en) * | 2013-08-01 | 2013-11-27 | 华南师范大学 | Method and device for building safety baselines of service system |
CN103746988A (en) * | 2013-12-31 | 2014-04-23 | 曙光云计算技术有限公司 | Security management method and system of cloud host machine |
CN106055984A (en) * | 2016-05-27 | 2016-10-26 | 浪潮电子信息产业股份有限公司 | Classified management method applied to security baseline software |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109582387A (en) * | 2018-11-26 | 2019-04-05 | 郑州云海信息技术有限公司 | Service recognition methods and the device of class baseline project |
CN109582387B (en) * | 2018-11-26 | 2022-06-07 | 郑州云海信息技术有限公司 | Service class baseline item identification method and device |
CN110008711A (en) * | 2019-04-15 | 2019-07-12 | 苏州浪潮智能科技有限公司 | A kind of security baseline detection method, device, equipment and readable storage medium storing program for executing |
CN114629690A (en) * | 2022-02-24 | 2022-06-14 | 广东电网有限责任公司 | Equipment safety baseline compliance detection method and device and computer equipment |
CN114629690B (en) * | 2022-02-24 | 2023-12-29 | 广东电网有限责任公司 | Device safety baseline compliance detection method and device and computer device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107659570A (en) | Webshell detection methods and system based on machine learning and static and dynamic analysis | |
US20120311709A1 (en) | Automatic management system for group and mutant information of malicious codes | |
CN101751530B (en) | Method for detecting loophole aggressive behavior and device | |
CN102467633A (en) | Method and system for safely browsing webpage | |
CN106294102A (en) | The method of testing of application program, client, server and system | |
CN102984128B (en) | A kind of network computer information security detection method | |
CN106845244A (en) | A kind of detection method and device | |
CN105306463A (en) | Modbus TCP intrusion detection method based on support vector machine | |
CN105243252A (en) | Account risk evaluation method and apparatus | |
CN108769070A (en) | One kind is gone beyond one's commission leak detection method and device | |
US11184313B1 (en) | Message content cleansing | |
CN116842531B (en) | Code vaccine-based vulnerability real-time verification method, device, equipment and medium | |
CN107577944A (en) | Website malicious code detecting method and device based on code syntax analyzer | |
CN113124328A (en) | Natural gas pipeline leakage detection method and system | |
CN106650454A (en) | SQL injection attack detection method and apparatus | |
CN104766016A (en) | Software vulnerability detection method based on short system call sequences | |
CN106095413A (en) | The collocation method of a kind of bluetooth driver and device | |
CN103368970B (en) | A kind of automation safety detection method for network objectives | |
CN104702598A (en) | Distributed network protocol security detection method for smart power grid | |
CN106354636A (en) | Method and device for code testing | |
CN105046154A (en) | Webshell detection method and device | |
CN107392027A (en) | A kind of website vulnerability method of testing, test system, electronic equipment and storage medium | |
CN104966019B (en) | A kind of heuristic document threat detection method and system | |
CN107995167B (en) | Equipment identification method and server | |
CN108763053B (en) | Method for generating buried point name and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |
|
RJ01 | Rejection of invention patent application after publication |