CN110914823B - 用于检测服务器上漏洞的系统和方法 - Google Patents
用于检测服务器上漏洞的系统和方法 Download PDFInfo
- Publication number
- CN110914823B CN110914823B CN201880044750.5A CN201880044750A CN110914823B CN 110914823 B CN110914823 B CN 110914823B CN 201880044750 A CN201880044750 A CN 201880044750A CN 110914823 B CN110914823 B CN 110914823B
- Authority
- CN
- China
- Prior art keywords
- server
- vulnerability
- service
- message
- services
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (20)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/647303 | 2017-07-12 | ||
US15/647,303 US10277621B2 (en) | 2017-07-12 | 2017-07-12 | Systems and methods for detecting vulnerabilities on servers |
PCT/US2018/041483 WO2019014248A1 (en) | 2017-07-12 | 2018-07-10 | SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES ON SERVERS |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110914823A CN110914823A (zh) | 2020-03-24 |
CN110914823B true CN110914823B (zh) | 2023-06-23 |
Family
ID=63145185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880044750.5A Active CN110914823B (zh) | 2017-07-12 | 2018-07-10 | 用于检测服务器上漏洞的系统和方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10277621B2 (zh) |
EP (1) | EP3652668B1 (zh) |
JP (1) | JP6957657B2 (zh) |
CN (1) | CN110914823B (zh) |
WO (1) | WO2019014248A1 (zh) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11429726B2 (en) * | 2018-01-23 | 2022-08-30 | CMMI Institute, LLC | Cybersecurity maturity assessment |
US11075936B2 (en) * | 2018-02-22 | 2021-07-27 | Illumio, Inc. | Generating vulnerability exposure scores in a segmented computing environment |
US11075937B2 (en) * | 2018-02-22 | 2021-07-27 | Illumio, Inc. | Generating a segmentation policy based on vulnerabilities |
US10771493B2 (en) * | 2018-09-18 | 2020-09-08 | International Business Machines Corporation | Cognitive security exposure analysis and resolution based on security trends |
US20200358806A1 (en) * | 2019-05-10 | 2020-11-12 | Cybeta, LLC | System and method for cyber security threat assessment |
CN111046393B (zh) * | 2019-12-14 | 2022-08-02 | 深圳市优必选科技股份有限公司 | 漏洞信息上传方法、装置、终端设备及存储介质 |
US11663544B2 (en) * | 2020-01-28 | 2023-05-30 | Salesforce.Com, Inc. | System and methods for risk assessment in a multi-tenant cloud environment |
US20220067173A1 (en) * | 2020-08-27 | 2022-03-03 | Checkmarx Ltd. | Automatic identification of flaws in software systems |
CN112434308B (zh) * | 2020-12-14 | 2024-02-20 | 招商局金融科技有限公司 | 应用漏洞检测方法、装置、电子设备及计算机存储介质 |
US12010517B1 (en) * | 2021-05-10 | 2024-06-11 | Zimperium, Inc. | Dynamic detection for mobile device security |
CN115168868B (zh) * | 2022-07-07 | 2023-05-16 | 广东永禾信息技术有限公司 | 一种应用于人工智能的业务漏洞分析方法及服务器 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104754048A (zh) * | 2015-03-30 | 2015-07-01 | 中国人民解放军信息工程大学 | 服务器集群的一种拟态组织结构 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000200288A (ja) * | 1999-01-07 | 2000-07-18 | Nec Corp | 検索結果解析方式 |
US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7150044B2 (en) * | 2003-03-10 | 2006-12-12 | Mci, Llc | Secure self-organizing and self-provisioning anomalous event detection systems |
US7761918B2 (en) * | 2004-04-13 | 2010-07-20 | Tenable Network Security, Inc. | System and method for scanning a network |
US7310669B2 (en) * | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US8805877B2 (en) * | 2009-02-11 | 2014-08-12 | International Business Machines Corporation | User-guided regular expression learning |
US20110138469A1 (en) * | 2009-12-03 | 2011-06-09 | Recursion Software, Inc. | System and method for resolving vulnerabilities in a computer network |
JP5931015B2 (ja) * | 2013-07-12 | 2016-06-08 | ヤフー株式会社 | 情報処理装置、システム、サーバ装置、端末及び情報処理方法 |
US20150220850A1 (en) * | 2014-02-06 | 2015-08-06 | SparkCognition, Inc. | System and Method for Generation of a Heuristic |
US9619655B2 (en) * | 2014-09-12 | 2017-04-11 | Salesforce.Com, Inc. | Cloud-based security profiling, threat analysis and intelligence |
-
2017
- 2017-07-12 US US15/647,303 patent/US10277621B2/en active Active
-
2018
- 2018-07-10 EP EP18752650.4A patent/EP3652668B1/en active Active
- 2018-07-10 CN CN201880044750.5A patent/CN110914823B/zh active Active
- 2018-07-10 JP JP2019572728A patent/JP6957657B2/ja active Active
- 2018-07-10 WO PCT/US2018/041483 patent/WO2019014248A1/en unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104754048A (zh) * | 2015-03-30 | 2015-07-01 | 中国人民解放军信息工程大学 | 服务器集群的一种拟态组织结构 |
Non-Patent Citations (1)
Title |
---|
赖维莹 ; 陈秀真 ; 李建华 ; .新型主动式漏洞检测系统.计算机工程.2008,第34卷(第18期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
US10277621B2 (en) | 2019-04-30 |
JP2020525960A (ja) | 2020-08-27 |
EP3652668B1 (en) | 2021-09-15 |
JP6957657B2 (ja) | 2021-11-02 |
CN110914823A (zh) | 2020-03-24 |
US20190020674A1 (en) | 2019-01-17 |
WO2019014248A1 (en) | 2019-01-17 |
EP3652668A1 (en) | 2020-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110914823B (zh) | 用于检测服务器上漏洞的系统和方法 | |
US11165811B2 (en) | Computer security vulnerability assessment | |
US11178170B2 (en) | Systems and methods for detecting anomalous behavior within computing sessions | |
US9330258B1 (en) | Systems and methods for identifying uniform resource locators that link to potentially malicious resources | |
US8671449B1 (en) | Systems and methods for identifying potential malware | |
US9083729B1 (en) | Systems and methods for determining that uniform resource locators are malicious | |
US8612594B1 (en) | Systems and methods for preventing data loss from files sent from endpoints | |
US9202057B2 (en) | Systems and methods for identifying private keys that have been compromised | |
US9185119B1 (en) | Systems and methods for detecting malware using file clustering | |
US10607005B2 (en) | Systems and methods for labeling automatically generated reports | |
US10242187B1 (en) | Systems and methods for providing integrated security management | |
US9385869B1 (en) | Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions | |
US9973525B1 (en) | Systems and methods for determining the risk of information leaks from cloud-based services | |
US9652615B1 (en) | Systems and methods for analyzing suspected malware | |
US10546123B1 (en) | Systems and methods for identifying malicious computer files | |
US10489587B1 (en) | Systems and methods for classifying files as specific types of malware | |
US10320816B1 (en) | Systems and methods for uniquely identifying malicious advertisements | |
US9122869B1 (en) | Systems and methods for detecting client types | |
US10530805B1 (en) | Systems and methods for detecting security incidents | |
US9146950B1 (en) | Systems and methods for determining file identities | |
US10181039B1 (en) | Systems and methods for providing computing security by classifying organizations | |
US10437994B1 (en) | Systems and methods for determining the reputations of unknown files | |
US11095666B1 (en) | Systems and methods for detecting covert channels structured in internet protocol transactions | |
US10339308B1 (en) | Systems and methods for remediating computer reliability issues | |
JP2023523162A (ja) | 埋め込みデバイスファームウェアのソフトウェア脆弱性を識別するためのシステム及び方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: California, USA Applicant after: Norton weifuke Co. Address before: California, USA Applicant before: Symantec Corp. |
|
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Arizona, USA Applicant after: Norton weifuke Co. Address before: California, USA Applicant before: Norton weifuke Co. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Arizona Patentee after: Keane Digital Co. Address before: Arizona Patentee before: Norton weifuke Co. |