CN107273497A - A kind of vulnerability information acquisition method and device - Google Patents

A kind of vulnerability information acquisition method and device Download PDF

Info

Publication number
CN107273497A
CN107273497A CN201710455954.5A CN201710455954A CN107273497A CN 107273497 A CN107273497 A CN 107273497A CN 201710455954 A CN201710455954 A CN 201710455954A CN 107273497 A CN107273497 A CN 107273497A
Authority
CN
China
Prior art keywords
leak
title
vulnerability information
keyword
leak title
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710455954.5A
Other languages
Chinese (zh)
Inventor
陈栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710455954.5A priority Critical patent/CN107273497A/en
Publication of CN107273497A publication Critical patent/CN107273497A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention provides a kind of vulnerability information acquisition method and device, this method can include:Predefine target leak distribution platform;It is determined that the period of collection, and at least one corresponding keyword of current production;Obtain at least one original list that the target leak distribution platform issues within the period and distinguish corresponding first link;For the first link each described, at least one leak title included in the respective list page is obtained one by one, and each described leak title difference corresponding second is linked;According at least one described keyword, filtration treatment is carried out to leak title each described, to determine at least one target leak title of the correspondence current production;For corresponding second link of target leak title difference each described, the vulnerability information included in respective page is gathered one by one.This programme can improve the collecting efficiency of vulnerability information.

Description

A kind of vulnerability information acquisition method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of vulnerability information acquisition method and device.
Background technology
With developing rapidly for network, the problem of network security becomes increasingly conspicuous as one.To improve to network security Pay attention to, it is to avoid cause economic loss, some leak distribution platforms arise at the historic moment (such as national information security breaches shared platform).Leakage Hole distribution platform is primarily used to issue various types of vulnerability informations, and whether each tissue (such as enterprise) deposits for determination Related product In big leak, the vulnerability information for the Related product issued in certain time period need to be acquired.
At present, when carrying out vulnerability information collection, mainly by manually being checked sometime on leak distribution platform All vulnerability informations of issue in section, and artificial screening is carried out one by one to all vulnerability informations, meet Related product to gather Vulnerability information.But, the quantity of usual leak distribution platform issue vulnerability information is more, then if still by manually entering one by one If row screening, it will take considerable time, so as to cause the collecting efficiency of vulnerability information relatively low.
The content of the invention
The embodiments of the invention provide a kind of vulnerability information acquisition method and device, it is possible to increase the collection effect of vulnerability information Rate.
In a first aspect, the embodiments of the invention provide a kind of vulnerability information acquisition method,
Predefine target leak distribution platform;Also include:
It is determined that the period of collection, and at least one corresponding keyword of current production;
Obtain at least one original list institute that the target leak distribution platform issues within the period right respectively The first link answered;
For the first link each described, at least one leak mark included in the respective list page is obtained one by one Topic, and each described leak title difference corresponding second are linked;
According at least one described keyword, filtration treatment is carried out to leak title each described, to determine that correspondence is described At least one target leak title of current production;
For corresponding second link of target leak title difference each described, institute in respective page is gathered one by one Comprising vulnerability information.
Preferably,
At least one keyword described in the basis, filtration treatment is carried out to leak title each described, to determine correspondence At least one target leak title of the current production, including:
For leak title each described, current leak title is compared with keyword each described successively, When it is determined that any one of keyword is not present in the current leak title, the current leak title is filtered, otherwise, The current leak title is defined as to the target leak title of the correspondence current production.
Preferably,
Described for each first link, at least one leakage included in the respective list page is obtained one by one After the title of hole, and it is described be directed to each described leak title, by current leak title successively with key each described Before word is compared, further comprise:
According at least one described keyword, leak title each described is entered row format conversion, with generate with it is described extremely A few keyword has each described leak title of same format;
It is described to be directed to each described leak title, current leak title is compared with keyword each described successively It is right, including:
For each enter row format conversion after the leak title, by current leak title successively with described in each Keyword is compared.
Preferably,
The vulnerability information, including:Leak description, CVE-ID (Common Vulnerabilities and Exposures-identification, public leak and exposure are numbered), issuing time, hazard level, influence product and leakage Any one or more in the solution of hole.
Preferably,
The vulnerability information, including:CVE-ID;
Further comprise:
When it is determined that collecting the corresponding vulnerability information respectively from target leak distribution platform described at least two, root Distinguish the corresponding CVE-ID according to vulnerability information each described, judge whether at least two identical vulnerability informations, If it is, carrying out deduplication processing at least two identicals vulnerability information.
Second aspect, the embodiments of the invention provide a kind of vulnerability information harvester, including:
First determining unit, the second determining unit, acquiring unit, filter element and collecting unit;Wherein,
First determining unit, for predefining target leak distribution platform;
At least one corresponding key of second determining unit, the period for determining collection, and current production Word;
The acquiring unit, for obtaining at least one that the target leak distribution platform issues within the period Original list distinguishes corresponding first link;For the first link each described, institute in the respective list page is obtained one by one Comprising at least one leak title, and corresponding second link of each described leak title difference;
The filter element, for according at least one described keyword, being carried out to leak title each described at filtering Reason, to determine at least one target leak title of the correspondence current production;
The collecting unit, for being linked for target leak title difference each described corresponding described second, by Vulnerability information included in individual collection respective page.
Preferably,
The filter element, specifically for for leak title each described, by current leak title successively with it is each The individual keyword is compared, when it is determined that any one of keyword is not present in the current leak title, filtering The current leak title, otherwise, the current leak title is defined as the target leak title of the correspondence current production.
Preferably,
Further comprise:Format conversion unit;
The format conversion unit, for according at least one described keyword, lattice to be carried out to leak title each described Formula is changed, to generate each the described leak title for having same format with least one described keyword;
The filter element, specifically for entering the leak title after row format is changed for each, will currently leak Hole title is compared with keyword each described successively.
Preferably,
The collecting unit, is further used for judging whether there is reference link in respective page, if it is, accessing institute The corresponding reference page of reference link is stated, and gathers the reference vulnerability information included in the reference page.
Preferably,
The vulnerability information, including:Leak description, CVE-ID, issuing time, hazard level, influence product and leak Any one or more in solution.
Preferably,
The vulnerability information, including:CVE-ID;
Further comprise:Deduplication unit;
The deduplication unit, for being collected respectively accordingly from target leak distribution platform described at least two when determination The vulnerability information when, the corresponding CVE-ID is distinguished according to each described vulnerability information, judged whether at least Two identical vulnerability informations, if it is, carrying out deduplication processing at least two identicals vulnerability information.
The embodiments of the invention provide a kind of vulnerability information acquisition method and device, when needs are in the leakage of predetermined target During the vulnerability information of hole distribution platform collection correlation, pass through and determine the period of collection and at least one corresponding pass of current production Key word achieves that automatic data collection, specifically, by obtaining each original list that the platform is issued in the period automatically First link, then for each first link, obtain the respective list page included in each leak title and its Corresponding second link, so as to just can go out not meeting the leak mark of current production according to each keyword automatic fitration of determination Topic, and the leak title for not filtered, by its corresponding second link, can automatic data collection to the leakage for meeting current production Hole information.Due to whole process, without being screened one by one by user again, the operation of repeater's work is instead of, therefore improve The collecting efficiency of vulnerability information.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart for vulnerability information acquisition method that one embodiment of the invention is provided;
Fig. 2 is a kind of flow chart for vulnerability information acquisition method that another embodiment of the present invention is provided;
Fig. 3 is the hardware architecture diagram of equipment where vulnerability information harvester provided in an embodiment of the present invention;
Fig. 4 is the structural representation for the vulnerability information harvester that one embodiment of the invention is provided;
Fig. 5 is the structural representation for the vulnerability information harvester that another embodiment of the present invention is provided;
Fig. 6 is the structural representation for the vulnerability information harvester that another embodiment of the invention is provided.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments, based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained on the premise of creative work is not made, belongs to the scope of protection of the invention.
As shown in figure 1, the embodiments of the invention provide a kind of vulnerability information acquisition method, this method can include following step Suddenly:
Step 101:Predefine target leak distribution platform.
Step 102:It is determined that the period of collection, and at least one corresponding keyword of current production.
Step 103:Obtain at least one original list that the target leak distribution platform is issued within the period Distinguish corresponding first link.
Step 104:For the first link each described, at least one included in the respective list page is obtained one by one Leak title, and each described leak title difference corresponding second are linked.
Step 105:According at least one described keyword, filtration treatment is carried out to leak title each described, to determine At least one target leak title of the correspondence current production.
Step 106:For corresponding second link of target leak title difference each described, gather one by one corresponding Vulnerability information included in the page.
In above-described embodiment, when needing to gather related vulnerability information in predetermined target leak distribution platform, Automatic data collection is achieved that by the period and at least one corresponding keyword of current production that determine collection, specifically, logical The first link for obtaining each original list that the platform is issued in the period automatically is crossed, then for each the first chain Connect, each leak title included in the respective list page and its corresponding second link are obtained, so that just can be according to true Each fixed keyword automatic fitration goes out not meeting the leak title of current production, and the leak title for not filtered, leads to Cross its corresponding second link, can automatic data collection to the vulnerability information for meeting current production.Due to whole process, without again by with Family is screened one by one, instead of the operation of repeater's work, therefore improve the efficiency of vulnerability information collection.
In order to find in leaky title and meet the leak title of current production, one embodiment of the invention In, the embodiment of the step 105, it may include:For leak title each described, by current leak title successively It is compared with keyword each described, when it is determined that any one of keyword is not present in the current leak title When, the current leak title is filtered, otherwise, the target that the current leak title is defined as the correspondence current production is leaked Hole title.
For example, the keyword determined has Mysql and Tomcat, the leak title 1 of acquisition is * * * Mysql, leak title 2 Be * * * Tomcat for * * * ROM**, leak title 3, due to there are the keyword of determination in leak title 1 and 3, therefore by this Two be defined as correspondence current production target leak title, and due in leak title 2 be not present Mysql and Tomcat in Any one, therefore leak title 2 is filtered out.And when comparing, have one in the title 1 that springs a leak if compared Keyword Mysql, then improve the efficiency that vulnerability information is gathered to be further, then without again by leak title 1 and another pass Key word Tomcat is compared.
In order to exactly find in leaky title and meet the leak title of current production, a reality of the invention Apply in example, after the step 104, and it is described be directed to each described leak title, by current leak title successively with Before each described keyword is compared, further comprise:According at least one described keyword, to leak each described Title enters row format conversion, to generate each the described leak title for having same format with least one described keyword;Institute State for each described leak title, current leak title is compared with keyword each described successively, including:Pin To the leak title that each enters after row format conversion, current leak title is carried out with keyword each described successively Compare.
In above-described embodiment, when the form of keyword of the leak title with determining is inconsistent, the unification of row format need to be entered, The embodiment of the present invention mainly carries out capital and small letter conversion to leak title.For example, each keyword determined is small letter, such as Tomcat, and the entitled * * Tomcat** of a leak collected, then in order to avoid there is mistake when comparing, then need Small letter conversion is carried out to * * Tomcat**, then the result after changing is * * tomcat**, so, afterwards when comparing due to * * There is tomcat, therefore the leak title of the entitled current production of the leak in tomcat**.But if directly by * * Tomcat** is compared with tomcat, then very likely due to not fully matching, then also filters out * * Tomcat**, from And the missing for causing vulnerability information to gather.
In order to improve vulnerability information, it is easy to user to realize in the reparation of relevant vulnerability, one embodiment of the invention, institute State the embodiment of step 106, it may include:Judge to whether there is reference link in respective page, if it is, accessing institute The corresponding reference page of reference link is stated, and gathers the reference vulnerability information included in the reference page.
For example, being linked as http second://www.cnvd.org.cn/flaw/show/CNVD-2017-08549 page Except including vulnerability information (such as hazard level in face:In;Leak is described:In ImageMagick7.0.5-5 versions There is refusal service leak in ' ReadICONImage ' function, attacker can cause to refuse by special file using the leak Service (RAM leakage)) outside, it is also possible to including reference link https://github.com/ImageMagick/ ImageMagick/issues/457, now can also follow up the link, access the page of the link, and capture included in the page Some information on current leak.
In one embodiment of the invention, the vulnerability information, including:Leak description, CVE-ID, issuing time, harm level Not, influence product and leak solution in any one or more.
In order to avoid showing the vulnerability information repeated to user, influence in Consumer's Experience, one embodiment of the invention, it is described Vulnerability information, including:CVE-ID;
It can further comprise:When it is determined that being collected respectively from target leak distribution platform described at least two corresponding described During vulnerability information, the corresponding CVE-ID is distinguished according to each described vulnerability information, at least two phases are judged whether Same vulnerability information, if it is, carrying out deduplication processing at least two identicals vulnerability information.
For example, having collected two vulnerability informations on current production, its CVE-ID points from target leak distribution platform a It is not CVE-2017-9405 and CVE-2017-8302, one on current production has been collected from target leak distribution platform b Individual vulnerability information, its CVE-ID is CVE-2017-9405, has been collected from target leak distribution platform c on current production Three vulnerability informations, its CVE-ID is CVE-2017-9405, CVE-2017-9013 and CVE-2017-8012 respectively, then be Avoid repeating, then need to carry out deduplication processing to the corresponding vulnerability informations of CVE-2017-9405 collected respectively from a, b and c, Namely the vulnerability information that only remaining 1 CVE-ID is CVE-2017-9405, after processing, common residue 2+1+3-2=4 Vulnerability information individual different but on current production.
Below will with gather CNVD (China National Vulnerability Database, national information safely leak Hole shared platform) issue relevant vulnerability information exemplified by, describe a kind of vulnerability information collection provided in an embodiment of the present invention in detail Method, as shown in Fig. 2 this method may comprise steps of:
Step 201:It is CNVD to predefine target leak distribution platform.
In the embodiment of the present invention, the relevant vulnerability information issued in order to automatic data collection CNVD can be based on writing Scrapy (crawl) framework is realized.
Step 202:It is determined that the period of collection is 2017/6/1-2017/6/7.
Wherein, the period of collection can be by program default setting (such as nearest one week), or user is according to actual need Ask and be configured manually.
Step 203:It is mysql and tomcat to determine the corresponding both keyword of current production.
Wherein, keyword can be manually entered by user, or be pre-configured with a keyed file, and such as acquiescence is closed Key word file is the keyword for including product in keyword.txt, this document, and each keyword occupies a line, then user Each required keyword is selected in the keyed file according to the demand of oneself.
Step 204:Obtain at least one original list that CNVD issue in 2017/6/1-2017/6/7 and distinguish corresponding the One link.
In the embodiment of the present invention, the first link refers to URL, and (Uniform Resource Locator, unified resource is fixed Position symbol)., then in advance need to be in Scrapy frameworks so for the URL of each corresponding original list of CNVD can be obtained Spider (spider) is write accordingly, and for ease of distinguishing, the Spider is named as by the embodiment of the present invention CnvdpostSpider, it, which is acted on, mainly sends HTTP (HyperText Transfer Protocol, Hyper text transfer association View) POST request, to read the data of response, then obtained using the Selectors (selector) in Scrapy frameworks CNVD distinguishes corresponding URL in 2017/6/1-2017/6/7 each original list issued.
For example, getting 16 original lists altogether distinguishes corresponding URL.
Step 205:For each the first link, at least one leak included in the respective list page is obtained one by one Title, and corresponding second link of each leak title difference.
In the embodiment of the present invention, that the second link refers to is also URL, and only URL and leak title is corresponded. So for each leak title can be obtained, then another Spider in Scrapy frameworks need to equally be carried out in advance corresponding Write, for ease of distinguishing, Spider is named as CnvdSpider by the embodiment of the present invention, it, which is acted on, is mainly read step 204 In 16 URL getting, and conduct interviews (send HTTP GET requests) one by one, to read the page of response, Ran Houli Leak title is obtained with Selectors, and is stored in the CnvdItem set and (is ordered by the Item (project) in Scrapy frameworks Name, it acts on the data for being primarily used to preserve webpage) in, then the Item Pipeline being delivered in Scrapy frameworks (project pipeline), to carry out the filtering of leak title.
For example, comprising 20 leak titles in each original list.
Step 206:According to mysql and tomcat, small letter conversion is carried out to each leak title.
For example, the corresponding character string of one of leak title is * * * * MYSQL**, then to avoid matched The leak title is filtered out during filter, therefore the character string of the leak title need to be subjected to small letter conversion, after conversion As a result it is * * * * mysql**.
Step 207:For the leak title of each small letter, current leak title is compared with both keyword successively It is right.
Step 208:It is determined that whether any one keyword is not present in current leak title, if it is, performing step 209, otherwise, perform step 210.
When being compared, if confirming there is keyword mysql in current leak title, you can perform step 210, be The collecting efficiency of vulnerability information is further improved, without again by the current leak title and a remaining keyword tomcat It is compared.
Step 209:Current leak title is filtered, and performs step 207.
Due to any one keyword being not present in current leak title, then illustrate the leakage corresponding to the current leak title Hole information is unrelated with current production, therefore directly filters out.
Step 210:Current leak title is defined as to the target leak title of correspondence current production.
Step 211:For corresponding second link of each target leak title difference, institute in respective page is gathered one by one Comprising vulnerability information.
For example, the embodiment of the present invention determines 3 target leak titles altogether, its corresponding URL is respectively http:// www.cnvd.org.cn/**-2017-08549、http://www.cnvd.org.cn/**-2017-08935、http:// Www.cnvd.org.cn/**-2017-08632, then be the collection for realizing vulnerability information, then also need to another in advance Spider is write accordingly, for ease of distinguishing, and Spider is named as CnvddetailSpider by the embodiment of the present invention, its Effect mainly reads this 3 URL, and accesses one by one, to read the page of response, then captures net using Selectors The content of page, namely detailed vulnerability information.
Step 212:Judge to whether there is reference link in respective page, if it is, performing step 213, otherwise, perform Step 214.
Some leak distribution platforms such as usual CNVD can also add the chain of other websites while vulnerability information is issued Connect as reference, such as CNVD would generally add the reference link of CVE links and manufacturer, can so make enterprise obtain it is more certain The relevant information of one leak, is conducive to early warning and repairs the leak.For example, reference link is https:// cxsecurity.com/issue/WLB-2017060062。
Step 213:The corresponding reference page of reference link is accessed, and gathers the reference leak letter included in reference page Breath.
Step 214:When it is determined that collecting corresponding vulnerability information respectively from least two target leak distribution platforms, Corresponding CVE-ID is distinguished according to each vulnerability information, at least two identical vulnerability informations are judged whether, if it is, Step 215 is then performed, otherwise, terminates current process.
For example, one that has collected that CVE-ID is CVE-2017-9405 from CNVD and another leak distribution platform Vulnerability information, then to avoid repeating, then need the leak collected respectively to the two leak distribution platforms to carry out duplicate removal and be combined And.
Step 215:Deduplication processing is carried out at least two identical vulnerability informations.
In the embodiment of the present invention, being finally provided to the vulnerability information of user includes:Adopted respectively from each leak distribution platform The vulnerability information collected carries out the vulnerability information after deduplication merging, and the corresponding reference leak for being also possible to get is believed Breath.
As shown in Figure 3, Figure 4, the embodiments of the invention provide a kind of vulnerability information harvester.Device embodiment can lead to Software realization is crossed, can also be realized by way of hardware or software and hardware combining.For hardware view, as shown in figure 3, being A kind of hardware structure diagram of equipment where vulnerability information harvester provided in an embodiment of the present invention, except the processing shown in Fig. 3 Outside device, internal memory, network interface and nonvolatile memory, the equipment in embodiment where device can also generally include Other hardware, are such as responsible for the forwarding chip of processing message.Exemplified by implemented in software, as shown in figure 4, being anticipated as a logic Device in justice, is to be read corresponding computer program instructions in nonvolatile memory by the CPU of equipment where it Operation is formed in internal memory.A kind of vulnerability information harvester that the present embodiment is provided, including:
First determining unit 401, the second determining unit 402, acquiring unit 403, filter element 404 and collecting unit 405; Wherein,
First determining unit 401, for predefining target leak distribution platform;
At least one corresponding pass of second determining unit 402, the period for determining collection, and current production Key word;
The acquiring unit 403, is issued at least for obtaining the target leak distribution platform within the period One original list distinguishes corresponding first link;For the first link each described, the respective list page is obtained one by one Included at least one leak title, and corresponding second link of each described leak title difference;
The filter element 404, for according at least one described keyword, being filtered to leak title each described Processing, to determine at least one target leak title of the correspondence current production;
The collecting unit 405, for being linked for target leak title difference each described corresponding described second, The vulnerability information included in respective page is gathered one by one.
In order to find in leaky title and meet the leak title of current production, one embodiment of the invention In, the filter element 404, specifically for for leak title each described, by current leak title successively with each The keyword is compared, and when it is determined that any one of keyword is not present in the current leak title, filters institute Current leak title is stated, otherwise, the current leak title is defined as to the target leak title of the correspondence current production.
In order to exactly find in leaky title and meet the leak title of current production, a reality of the invention Apply in example, as shown in figure 5, further comprising:Format conversion unit 501;
The format conversion unit 501, for according at least one described keyword, being carried out to leak title each described Form is changed, to generate each the described leak title for having same format with least one described keyword;
The filter element 404, will be current specifically for entering the leak title after row format is changed for each Leak title is compared with keyword each described successively.
In order to improve in vulnerability information, one embodiment of the invention, the collecting unit 405 is further used for sentencing It whether there is reference link in disconnected respective page, if it is, accessing the corresponding reference page of the reference link, and gather institute State the reference vulnerability information included in reference page.
In one embodiment of the invention, the vulnerability information, including:Leak description, CVE-ID, issuing time, harm level Not, influence product and leak solution in any one or more.
In order to avoid showing the vulnerability information repeated to user, influence in Consumer's Experience, one embodiment of the invention, it is described Vulnerability information, including:CVE-ID;As shown in fig. 6, further comprising:Deduplication unit 601;
The deduplication unit 601, for being collected respectively from target leak distribution platform described at least two when determination During the corresponding vulnerability information, the corresponding CVE-ID is distinguished according to each described vulnerability information, judged whether At least two identical vulnerability informations, if it is, carrying out deduplication processing at least two identicals vulnerability information.
The contents such as the information exchange between each unit, implementation procedure in said apparatus, due to implementing with the inventive method Example is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
Present invention also offers a kind of computer-readable medium, including execute instruction, when the processor of storage control is held During the row execute instruction, the storage control performs the vulnerability information collection side that any of the above-described embodiment of the invention is provided Method.
In addition, present invention also offers a kind of storage control, including:Processor, memory and bus;
The memory is used to store execute instruction, and the processor is connected with the memory by the bus, when During the storage control operation, the execute instruction of memory storage described in the computing device, so that the storage Controller performs the vulnerability information acquisition method that any of the above-described embodiment of the invention is provided.
To sum up, each embodiment of the invention at least has the advantages that:
1st, in embodiments of the present invention, when needs gather related leak letter in predetermined target leak distribution platform During breath, automatic data collection is achieved that by the period and at least one corresponding keyword of current production that determine collection, specifically , by obtaining the first link of each original list that the platform is issued in the period automatically, then for each First link, obtains each leak title included in the respective list page and its corresponding second link, so that just can be with Go out not meeting the leak title of current production according to each keyword automatic fitration of determination, and the leak mark for not filtered Topic, by its corresponding second link, can automatic data collection to the vulnerability information for meeting current production.Due to whole process, without Screened one by one by user again, instead of the operation of repeater's work, therefore improve the efficiency of vulnerability information collection.
2nd, in embodiments of the present invention, after each leak title is got automatically, by entering to each leak title Row format is changed, and has identical form with the keyword for being converted into and determining, so as to avoid due to form disunity The filtering error caused, can more accurately gather each vulnerability information of current production, it is to avoid because collection error is brought Economic loss.
3rd, in embodiments of the present invention, by the reference link recommended in the corresponding page of the link of follow-up second, enterprise can be made Industry obtains the relevant information of more a certain leaks, is conducive to early warning and repairs the leak.
4th, in embodiments of the present invention, when it is determined that getting the leak letter of correlation automatically from least two leak distribution platforms During breath, by carrying out deduplication processing at least two vulnerability informations from different platform, to provide the user at deduplication Latter incorporated vulnerability information is managed, is easy to user to be checked, Consumer's Experience is improved.
5th, in embodiments of the present invention, by realizing automation collection vulnerability information, computer generation can be made to replace repeater Work is operated, and has been saved the cost of labor of preciousness, has been improved the operating efficiency of enterprise.
It should be noted that herein, such as first and second etc relational terms are used merely to an entity Or operation makes a distinction with another entity or operation, and not necessarily require or imply exist between these entities or operation Any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant be intended to it is non- It is exclusive to include, so that process, method, article or equipment including a series of key elements not only include those key elements, But also other key elements including being not expressly set out, or also include solid by this process, method, article or equipment Some key elements.In the absence of more restrictions, by sentence " including the key element that a 〃 〃 " is limited, it is not excluded that Also there is other identical factor in the process including the key element, method, article or equipment.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in the storage medium of embodied on computer readable, the program Upon execution, the step of including above method embodiment is performed;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
It is last it should be noted that:Presently preferred embodiments of the present invention is the foregoing is only, the skill of the present invention is merely to illustrate Art scheme, is not intended to limit the scope of the present invention.Any modification for being made within the spirit and principles of the invention, Equivalent substitution, improvement etc., are all contained in protection scope of the present invention.

Claims (10)

1. a kind of vulnerability information acquisition method, it is characterised in that
Predefine target leak distribution platform;Also include:
It is determined that the period of collection, and at least one corresponding keyword of current production;
Obtain at least one original list that the target leak distribution platform issues within the period and distinguish corresponding First link;
For the first link each described, at least one leak title included in the respective list page is obtained one by one, with And each described leak title difference corresponding second is linked;
According at least one described keyword, filtration treatment is carried out to leak title each described, to determine that correspondence is described current At least one target leak title of product;
For corresponding second link of target leak title difference each described, gather one by one included in respective page Vulnerability information.
2. vulnerability information acquisition method according to claim 1, it is characterised in that
At least one keyword described in the basis, filtration treatment is carried out to leak title each described, to determine that correspondence is described At least one target leak title of current production, including:
For leak title each described, current leak title is compared with keyword each described successively, when true When any one of keyword is not present in the fixed current leak title, the current leak title is filtered, otherwise, by institute State the target leak title that current leak title is defined as the correspondence current production.
3. vulnerability information acquisition method according to claim 2, it is characterised in that
Described for each first link, at least one leak mark included in the respective list page is obtained one by one After topic, and each described leak title is directed to described, current leak title is entered with keyword each described successively Before row is compared, further comprise:
According at least one described keyword, row format conversion is entered to leak title each described, to generate and described at least one Individual keyword has each described leak title of same format;
It is described to be directed to each described leak title, current leak title is compared with keyword each described successively, Including:
For each enter row format conversion after the leak title, by current leak title successively with key each described Word is compared.
4. vulnerability information acquisition method according to claim 1, it is characterised in that
It is described to be linked for each described target leak title difference corresponding described second, institute in respective page is gathered one by one Comprising vulnerability information, further comprise:
Judge to whether there is reference link in respective page, if it is, the corresponding reference page of the reference link is accessed, and Gather the reference vulnerability information included in the reference page.
5. according to any described vulnerability information acquisition methods of claim 1-4, it is characterised in that
The vulnerability information, including:Leak description, public leak and exposure numbering CVE-ID, issuing time, hazard level, shadow Ring any one or more in product and leak solution;
And/or,
The vulnerability information, including:CVE-ID;
Further comprise:
When it is determined that collecting the corresponding vulnerability information respectively from target leak distribution platform described at least two, according to every One vulnerability information distinguishes the corresponding CVE-ID, judges whether at least two identical vulnerability informations, if It is that deduplication processing then is carried out at least two identicals vulnerability information.
6. a kind of vulnerability information harvester, it is characterised in that including:
First determining unit, the second determining unit, acquiring unit, filter element and collecting unit;Wherein,
First determining unit, for predefining target leak distribution platform;
Second determining unit, the period for determining collection, and at least one corresponding keyword of current production;
The acquiring unit, for obtaining at least one list that the target leak distribution platform is issued within the period The page distinguishes corresponding first link;For the first link each described, obtain one by one included in the respective list page At least one leak title, and corresponding second link of each described leak title difference;
The filter element, for according at least one described keyword, filtration treatment to be carried out to leak title each described, with It is determined that at least one target leak title of the correspondence current production;
The collecting unit, for for corresponding second link of target leak title difference each described, adopting one by one Collect the vulnerability information included in respective page.
7. vulnerability information harvester according to claim 6, it is characterised in that
The filter element, specifically for for leak title each described, by current leak title successively with each institute State keyword to be compared, when it is determined that any one of keyword is not present in the current leak title, filtering is described Current leak title, otherwise, the current leak title is defined as the target leak title of the correspondence current production.
8. vulnerability information harvester according to claim 7, it is characterised in that
Further comprise:Format conversion unit;
The format conversion unit, for according at least one described keyword, row format being entered to leak title each described and is turned Change, to generate each described leak title that there is same format with least one described keyword;
The filter element, specifically for entering the leak title after row format is changed for each, by current leak mark Topic is compared with keyword each described successively.
9. vulnerability information harvester according to claim 6, it is characterised in that
The collecting unit, is further used for judging whether there is reference link in respective page, if it is, accessing the ginseng The corresponding reference page of link is examined, and gathers the reference vulnerability information included in the reference page.
10. according to any described vulnerability information harvesters of claim 6-9, it is characterised in that
The vulnerability information, including:Leak description, CVE-ID, issuing time, hazard level, influence product and leak are solved Any one or more in scheme;
And/or,
The vulnerability information, including:CVE-ID;
Further comprise:Deduplication unit;
The deduplication unit, determines to collect corresponding institute respectively from target leak distribution platform described at least two for working as When stating vulnerability information, the corresponding CVE-ID is distinguished according to each described vulnerability information, at least two are judged whether Identical vulnerability information, if it is, carrying out deduplication processing at least two identicals vulnerability information.
CN201710455954.5A 2017-06-16 2017-06-16 A kind of vulnerability information acquisition method and device Pending CN107273497A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710455954.5A CN107273497A (en) 2017-06-16 2017-06-16 A kind of vulnerability information acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710455954.5A CN107273497A (en) 2017-06-16 2017-06-16 A kind of vulnerability information acquisition method and device

Publications (1)

Publication Number Publication Date
CN107273497A true CN107273497A (en) 2017-10-20

Family

ID=60067605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710455954.5A Pending CN107273497A (en) 2017-06-16 2017-06-16 A kind of vulnerability information acquisition method and device

Country Status (1)

Country Link
CN (1) CN107273497A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134613A (en) * 2019-05-22 2019-08-16 北京航空航天大学 A kind of software defect data collection system based on code semanteme and background information
CN110768977A (en) * 2019-10-21 2020-02-07 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853277A (en) * 2010-05-14 2010-10-06 南京信息工程大学 Vulnerability data mining method based on classification and association analysis
CN102902703A (en) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 Network sensitive information-oriented screenshot discovery and locking callback method
CN103927370A (en) * 2014-04-23 2014-07-16 焦点科技股份有限公司 Network information batch acquisition method of combined text and picture information
US20160127410A1 (en) * 2012-12-18 2016-05-05 Tinfoil Security, Inc. System and methods for scalably identifying and characterizing structural differences between document object models
CN106357635A (en) * 2016-09-09 2017-01-25 浪潮软件集团有限公司 Vulnerability comparison analysis method based on homologous framework

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853277A (en) * 2010-05-14 2010-10-06 南京信息工程大学 Vulnerability data mining method based on classification and association analysis
CN102902703A (en) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 Network sensitive information-oriented screenshot discovery and locking callback method
US20160127410A1 (en) * 2012-12-18 2016-05-05 Tinfoil Security, Inc. System and methods for scalably identifying and characterizing structural differences between document object models
CN103927370A (en) * 2014-04-23 2014-07-16 焦点科技股份有限公司 Network information batch acquisition method of combined text and picture information
CN106357635A (en) * 2016-09-09 2017-01-25 浪潮软件集团有限公司 Vulnerability comparison analysis method based on homologous framework

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
顾韵华等: "网络安全漏洞信息采集系统的研究", 《计算机工程与设计》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134613A (en) * 2019-05-22 2019-08-16 北京航空航天大学 A kind of software defect data collection system based on code semanteme and background information
CN110768977A (en) * 2019-10-21 2020-02-07 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information
CN110768977B (en) * 2019-10-21 2022-02-25 中国民航信息网络股份有限公司 Method and system for capturing security vulnerability information

Similar Documents

Publication Publication Date Title
Gupta et al. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications
CN106572117B (en) A kind of detection method and device of WebShell file
CN105243159A (en) Visual script editor-based distributed web crawler system
CN102947767B (en) Display has the method and system of the live thumbnail of the procedure graph diagram of priority
EP3726410B1 (en) Interpretation device, interpretation method and interpretation program
KR101092024B1 (en) Real-time vulnerability diagnoses and results information offer service system of web service
US20120102543A1 (en) Audit Management System
CN107451034A (en) A kind of big data cluster log management apparatus, method and system
CN103368957B (en) Method and system that web page access behavior is processed, client, server
CN108628748B (en) Automatic test management method and automatic test management system
CN106101130A (en) A kind of network malicious data detection method, Apparatus and system
RU2757597C1 (en) Systems and methods for reporting computer security incidents
CN109213773A (en) A kind of diagnostic method, device and the electronic equipment of online failure
CN107612730A (en) A kind of log collection analysis method, device and system
CN106027528A (en) WEB horizontal authority automatic identification method and device
CN107273497A (en) A kind of vulnerability information acquisition method and device
CN103312692B (en) Chained address safety detecting method and device
CN114528457A (en) Web fingerprint detection method and related equipment
CN110659973A (en) Fund tracking method, device and equipment
CN114528132A (en) Deep-level cause analysis of storage system failures
CN107317708A (en) The monitoring method and device of a kind of Court business application system
CN107222497A (en) Network traffic anomaly monitor method and electronic equipment
CN109446441A (en) A kind of credible distributed capture storage system of general Web Community
CN103336693A (en) Method and device for establishing refer chain and security detection device
CN109359251A (en) Audit method for early warning, device and the terminal device of application system service condition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171020

RJ01 Rejection of invention patent application after publication