CN114584342B - Network vulnerability recognition and detection system based on data analysis - Google Patents

Network vulnerability recognition and detection system based on data analysis Download PDF

Info

Publication number
CN114584342B
CN114584342B CN202210048478.6A CN202210048478A CN114584342B CN 114584342 B CN114584342 B CN 114584342B CN 202210048478 A CN202210048478 A CN 202210048478A CN 114584342 B CN114584342 B CN 114584342B
Authority
CN
China
Prior art keywords
vulnerability
network
loopholes
vulnerabilities
influence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210048478.6A
Other languages
Chinese (zh)
Other versions
CN114584342A (en
Inventor
杨牧天
刘梅
吴敬征
罗天悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Weilan Technology Co ltd
Original Assignee
Beijing Zhongke Weilan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongke Weilan Technology Co ltd filed Critical Beijing Zhongke Weilan Technology Co ltd
Priority to CN202210048478.6A priority Critical patent/CN114584342B/en
Publication of CN114584342A publication Critical patent/CN114584342A/en
Application granted granted Critical
Publication of CN114584342B publication Critical patent/CN114584342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The invention discloses a network vulnerability identification detection system based on data analysis, relates to the technical field of network vulnerability identification detection, and solves the technical problem that the occurrence risk of network vulnerabilities cannot be controlled due to incapability of carrying out relevance analysis on the network vulnerabilities in the prior art, and carries out detection and identification on the network vulnerabilities, thereby improving the accuracy of network vulnerability detection and identification and reducing the influence of the network vulnerabilities on network data; carrying out relevance analysis on each network vulnerability and judging whether each network vulnerability is relevant or not, thereby judging whether the network vulnerability can appear successively, improving the predictability of the network vulnerability, effectively reducing the influence caused by burst network vulnerability and simultaneously reducing the risk of the network vulnerability on network data; and detecting the environment of the current network, and judging whether the current network is normal or not, so as to analyze the occurrence probability of the network vulnerability and the influence of the network vulnerability on the network.

Description

Network vulnerability recognition and detection system based on data analysis
Technical Field
The invention relates to the technical field of network vulnerability identification and detection, in particular to a network vulnerability identification and detection system based on data analysis.
Background
Network vulnerabilities can generally be understood as defects in the specific implementation of hardware, software, protocols, etc., or in the security policies of the system, which can enable an attacker to access or destroy the system without authorization. Popular descriptive definitions are everything that exists in computer network systems that can cause damage to the components and data in the system, etc.;
in the prior art, however, in the network vulnerability detection and identification process, correlation analysis cannot be performed on the network vulnerability, so that the occurrence risk of the network vulnerability cannot be controlled, and the potential safety hazard of the network environment is increased;
in view of the above technical drawbacks, a solution is now proposed.
Disclosure of Invention
The invention aims to solve the problem by providing a network vulnerability identification detection system based on data analysis, which is used for detecting and identifying network vulnerabilities, so that the accuracy of network vulnerability detection and identification is improved, and the influence of the network vulnerabilities on network data is reduced; carrying out relevance analysis on each network vulnerability and judging whether each network vulnerability is relevant or not, thereby judging whether the network vulnerability can appear successively, improving the predictability of the network vulnerability, effectively reducing the influence caused by burst network vulnerability and simultaneously reducing the risk of the network vulnerability on network data; and detecting the environment of the current network, and judging whether the current network is normal or not, so as to analyze the occurrence probability of the network vulnerability and the influence of the network vulnerability on the network.
The aim of the invention can be achieved by the following technical scheme:
the network vulnerability identification detection system based on the data analysis comprises a network vulnerability detection and identification platform, wherein a server is arranged in the network vulnerability detection and identification platform and is in communication connection with a vulnerability relevance analysis unit, a network environment detection unit, a verification task allocation optimization unit and a database;
the network vulnerability detection and recognition platform is used for detecting and recognizing network vulnerabilities, the server generates relevance analysis signals and sends the relevance analysis signals to the vulnerability relevance analysis unit, and relevance analysis is carried out on each network vulnerability through the vulnerability relevance analysis unit; the server generates a network environment detection signal and sends the network environment detection signal to a network environment detection unit, and the network environment detection unit detects the environment of the current network; the server generates a verification task allocation optimization signal and sends the verification task allocation optimization signal to the verification task allocation optimization unit, and maintenance personnel are reasonably matched through verification of the verification task allocation optimization unit on network vulnerabilities.
As a preferred embodiment of the present invention, the vulnerability correlation analysis unit has the following vulnerability correlation analysis process:
marking a network building time as an initial time, constructing a vulnerability analysis time period according to the current time and the initial time, collecting network vulnerabilities appearing in the vulnerability analysis time period, and collecting vulnerability data corresponding to the network vulnerabilities appearing in the vulnerability analysis time period, wherein the vulnerability data comprises influence duration, influence network speed floating values and influence data downloading flow of the vulnerabilities, marking the network vulnerabilities appearing in the vulnerability analysis time period as historical vulnerabilities, setting the labels i and i as natural numbers larger than 1, marking the vulnerability data corresponding to the historical vulnerabilities as influence factors, marking the influence of the influence factors on the network data as influence features, and the influence features are represented as increase of the influence duration of the vulnerabilities, increase of the network speed floating values or decrease of the data downloading flow;
sequencing the collected historical vulnerabilities according to the sequence of the vulnerability analysis time period, constructing a historical vulnerability set, collecting the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets in the historical vulnerability set, and comparing the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to the adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets with an interval duration threshold and an influence duration difference value respectively:
if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset associated vulnerabilities; if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is larger than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is larger than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset unassociated vulnerabilities;
comparing the influence factors and the influence characteristics of the preset association loopholes with those of the preset non-association loopholes, and marking the corresponding preset association loopholes as selected association loopholes if the influence factors and the influence characteristics of the preset association loopholes are consistent; if the influence factors and the influence characteristics of the preset association loopholes are inconsistent in comparison, marking the corresponding preset association loopholes as risk association loopholes; if the influence factors and the influence characteristics of the preset non-associated loopholes are consistent in comparison, marking the corresponding preset non-associated loopholes as monitoring associated loopholes; if the comparison of the influence factors and the influence features of the preset non-associated loopholes is inconsistent, marking the corresponding preset non-associated loopholes as selected non-associated loopholes;
sending the selected associated vulnerability, the risk associated vulnerability, the monitoring associated vulnerability and the selected non-associated vulnerability to a server; the server receives the selected association vulnerability, the risk association vulnerability, the monitoring association vulnerability and the non-association vulnerability, then forwards the selected association vulnerability and the non-association vulnerability to the database for storage, meanwhile, detects the risk association vulnerability and the monitoring association vulnerability, and if the number of successive occurrences of the corresponding risk association vulnerability and the monitoring association vulnerability exceeds a corresponding number of times threshold, judges the risk association vulnerability or the monitoring association vulnerability as the selected association vulnerability.
As a preferred embodiment of the present invention, the network environment detection process of the network environment detection unit is as follows:
setting a network environment detection time period, collecting network vulnerability screening frequency and the number of network vulnerabilities in a network vulnerability screening period in the network environment detection time period, and comparing the network vulnerability screening frequency and the number of network vulnerabilities in the network vulnerability screening period with a network vulnerability screening frequency threshold and a network vulnerability occurrence number threshold respectively:
if the network vulnerability screening frequency exceeds the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period does not exceed the network vulnerability occurrence number threshold, judging that the corresponding network environment is safe, generating a network environment safety signal and sending the network environment safety signal to a server; if the network vulnerability screening frequency does not exceed the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period exceeds the network vulnerability occurrence number threshold, judging that the corresponding network environment is unsafe, generating a network environment risk signal and sending the network environment risk signal to a server.
As a preferred embodiment of the present invention, the verification task allocation optimization procedure of the verification task allocation optimization unit is as follows:
collecting network loopholes appearing in real time, marking the network loopholes as real-time loopholes, comparing the real-time loopholes with historical loopholes in a database, if the comparison is consistent, acquiring the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes, and comparing the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes with a selected association loophole number threshold and a longest maintenance time threshold respectively:
if the number of the selected associated loopholes of the real-time loopholes exceeds the threshold value of the number of the selected associated loopholes or the longest maintenance duration corresponding to the selected associated loopholes exceeds the threshold value of the longest maintenance duration, marking the corresponding loopholes as first-level known loopholes; if the number of the selected associated loopholes of the real-time loopholes does not exceed the threshold value of the number of the selected associated loopholes and the longest maintenance duration corresponding to the selected associated loopholes does not exceed the threshold value of the longest maintenance duration, marking the corresponding loopholes as secondary known loopholes;
if the comparison is inconsistent, comparing the duration of the influence characteristic corresponding to the real-time vulnerability and the quantity of the influence factors with a duration threshold and a quantity threshold of the influence factors respectively:
if the duration of the real-time vulnerability corresponding influence features exceeds the duration threshold and the number of influence factors exceeds the influence factor number threshold, marking the corresponding network vulnerability as a first-level unknown vulnerability; if the duration of the real-time vulnerability corresponding influence features does not exceed the duration threshold and the number of influence factors does not exceed the influence factor number threshold, marking the corresponding network vulnerability as a secondary unknown vulnerability;
dividing the real-time idle maintenance personnel according to the maintenance times, and marking the corresponding real-time idle maintenance personnel as real-time primary personnel if the corresponding maintenance times of the real-time idle maintenance personnel exceed a maintenance times threshold value; if the corresponding maintenance times of the maintenance personnel which are idle in real time do not exceed the maintenance times threshold value, marking the maintenance personnel which are idle in real time as real-time secondary personnel;
matching a first-stage known vulnerability and a first-stage unknown vulnerability to real-time first-stage personnel, and matching a second-stage known vulnerability and a second-stage unknown vulnerability to real-time second-stage personnel; and sending the matched maintainers and network vulnerabilities to a server.
Compared with the prior art, the invention has the beneficial effects that:
in the invention, the network loopholes are detected and identified, thereby improving the accuracy of detecting and identifying the network loopholes and reducing the influence of the network loopholes on the network data; carrying out relevance analysis on each network vulnerability and judging whether each network vulnerability is relevant or not, thereby judging whether the network vulnerability can appear successively, improving the predictability of the network vulnerability, effectively reducing the influence caused by burst network vulnerability and simultaneously reducing the risk of the network vulnerability on network data; detecting the environment of the current network, and judging whether the current network is normal or not, so as to analyze the occurrence probability of network vulnerabilities and the influence of the network vulnerabilities on the network; the verification of the network loopholes reasonably matches with maintenance personnel, so that the verification task allocation is optimized according to the loophole information, the importance and the work task information of the verification personnel, the verification efficiency is improved, the high efficiency of the loophole maintenance is improved, and the influence of the network environment of the loopholes is reduced.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
Fig. 1 is a functional block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a network vulnerability identification detection system based on data analysis includes a network vulnerability detection and identification platform, wherein a server is arranged in the network vulnerability detection and identification platform, and the server is in communication connection with a vulnerability correlation analysis unit, a network environment detection unit, a verification task allocation optimization unit and a database; the server is in bidirectional communication connection with the vulnerability association analysis unit, the network environment detection unit, the verification task allocation optimization unit and the database;
the network vulnerability detection and identification platform is used for detecting and identifying network vulnerabilities, so that accuracy of network vulnerability detection and identification is improved, influence of the network vulnerabilities on network data is reduced, a server generates relevance analysis signals and sends the relevance analysis signals to a vulnerability relevance analysis unit, the vulnerability relevance analysis unit is used for carrying out relevance analysis on each network vulnerability, judging whether each network vulnerability is relevant or not, judging whether the network vulnerabilities can appear successively or not, improving predictability of the network vulnerabilities, effectively reducing influence caused by sudden network vulnerabilities, reducing risks of the network vulnerabilities on the network data, and the specific vulnerability relevance analysis process is as follows:
marking a network building time as an initial time, constructing a vulnerability analysis time period according to the current time and the initial time, collecting network vulnerabilities appearing in the vulnerability analysis time period, and collecting vulnerability data corresponding to the network vulnerabilities appearing in the vulnerability analysis time period, wherein the vulnerability data comprises influence duration, influence network speed floating values and influence data downloading flow of the vulnerabilities, marking the network vulnerabilities appearing in the vulnerability analysis time period as historical vulnerabilities, setting the labels i and i as natural numbers larger than 1, marking the vulnerability data corresponding to the historical vulnerabilities as influence factors, marking the influence of the influence factors on the network data as influence features, and the influence features are represented as increase of the influence duration of the vulnerabilities, increase of the network speed floating values or decrease of the data downloading flow;
sequencing the collected historical vulnerabilities according to the sequence of the vulnerability analysis time period, constructing a historical vulnerability set, collecting the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets in the historical vulnerability set, and comparing the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to the adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets with an interval duration threshold and an influence duration difference value respectively:
if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset associated vulnerabilities; if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is larger than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is larger than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset unassociated vulnerabilities;
comparing the influence factors and the influence characteristics of the preset association loopholes with those of the preset non-association loopholes, and marking the corresponding preset association loopholes as selected association loopholes if the influence factors and the influence characteristics of the preset association loopholes are consistent; if the influence factors and the influence characteristics of the preset association loopholes are inconsistent in comparison, marking the corresponding preset association loopholes as risk association loopholes; if the influence factors and the influence characteristics of the preset non-associated loopholes are consistent in comparison, marking the corresponding preset non-associated loopholes as monitoring associated loopholes; if the comparison of the influence factors and the influence features of the preset non-associated loopholes is inconsistent, marking the corresponding preset non-associated loopholes as selected non-associated loopholes;
sending the selected associated vulnerability, the risk associated vulnerability, the monitoring associated vulnerability and the selected non-associated vulnerability to a server; the server receives the selected association vulnerability, the risk association vulnerability, the monitoring association vulnerability and the non-association vulnerability, then forwards the selected association vulnerability and the non-association vulnerability to the database for storage, and detects the risk association vulnerability and the monitoring association vulnerability at the same time, and if the occurrence frequency of the corresponding risk association vulnerability and the monitoring association vulnerability exceeds the corresponding frequency threshold value, the risk association vulnerability or the monitoring association vulnerability is judged to be the selected association vulnerability; in the method, the selected associated loopholes, the risk associated loopholes, the monitored associated loopholes and the selected non-associated loopholes are distinguished, the loopholes appearing in the network are divided, and when the network appears the loopholes in real time, the associated loopholes, the non-associated loopholes and the like can be definitely determined, so that the risk coefficient of the real-time loopholes and the targeted maintenance loopholes are accurately judged, and the maintenance efficiency of the loopholes is ensured;
the server generates a network environment detection signal and sends the network environment detection signal to the network environment detection unit, the network environment detection unit is used for detecting the environment of the current network and judging whether the current network is normal or not, so that the occurrence probability of network vulnerabilities and the influence of the network vulnerabilities on the network are analyzed, and the specific network environment detection process is as follows:
setting a network environment detection time period, collecting network vulnerability screening frequency and the number of network vulnerabilities in a network vulnerability screening period in the network environment detection time period, and comparing the network vulnerability screening frequency and the number of network vulnerabilities in the network vulnerability screening period with a network vulnerability screening frequency threshold and a network vulnerability occurrence number threshold respectively:
if the network vulnerability screening frequency exceeds the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period does not exceed the network vulnerability occurrence number threshold, judging that the corresponding network environment is safe, generating a network environment safety signal and sending the network environment safety signal to a server; if the network vulnerability screening frequency does not exceed the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period exceeds the network vulnerability occurrence number threshold, judging that the corresponding network environment is unsafe, generating a network environment risk signal and sending the network environment risk signal to a server; the network vulnerability screening frequency and the number of times of occurrence of the network vulnerability in the network vulnerability screening period can show the state of the network environment, and when the network vulnerability screening frequency and the number of times of occurrence of the network vulnerability in the network vulnerability screening period are not in direct proportion, the condition that the corresponding network environment is abnormal is shown; such as: when the network vulnerability screening frequency is once every ten days and the number of vulnerability occurrence times in the screening frequency once every ten days is ten, judging that the network environment is abnormal;
the server generates a verification task allocation optimization signal and sends the verification task allocation optimization signal to the verification task allocation optimization unit, and the verification task allocation optimization unit is used for reasonably matching maintenance personnel for verification of network vulnerabilities, so that verification task allocation is optimized according to vulnerability information, importance and work task information of the verification personnel, verification efficiency is improved, vulnerability maintenance efficiency is improved, influence of network environments of vulnerabilities is reduced, and the specific verification task allocation optimization process is as follows:
collecting network loopholes appearing in real time, marking the network loopholes as real-time loopholes, comparing the real-time loopholes with historical loopholes in a database, if the comparison is consistent, acquiring the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes, and comparing the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes with a selected association loophole number threshold and a longest maintenance time threshold respectively:
if the number of the selected associated loopholes of the real-time loopholes exceeds the threshold value of the number of the selected associated loopholes or the longest maintenance duration corresponding to the selected associated loopholes exceeds the threshold value of the longest maintenance duration, marking the corresponding loopholes as first-level known loopholes; if the number of the selected associated loopholes of the real-time loopholes does not exceed the threshold value of the number of the selected associated loopholes and the longest maintenance duration corresponding to the selected associated loopholes does not exceed the threshold value of the longest maintenance duration, marking the corresponding loopholes as secondary known loopholes; the loopholes are classified, so that the loopholes can be effectively and reasonably detected and maintained;
if the comparison is inconsistent, comparing the duration of the influence characteristic corresponding to the real-time vulnerability and the quantity of the influence factors with a duration threshold and a quantity threshold of the influence factors respectively:
if the duration of the real-time vulnerability corresponding influence features exceeds the duration threshold and the number of influence factors exceeds the influence factor number threshold, marking the corresponding network vulnerability as a first-level unknown vulnerability; if the duration of the real-time vulnerability corresponding influence features does not exceed the duration threshold and the number of influence factors does not exceed the influence factor number threshold, marking the corresponding network vulnerability as a secondary unknown vulnerability;
dividing the real-time idle maintenance personnel according to the maintenance times, and marking the corresponding real-time idle maintenance personnel as real-time primary personnel if the corresponding maintenance times of the real-time idle maintenance personnel exceed a maintenance times threshold value; if the corresponding maintenance times of the maintenance personnel which are idle in real time do not exceed the maintenance times threshold value, marking the maintenance personnel which are idle in real time as real-time secondary personnel;
matching a first-stage known vulnerability and a first-stage unknown vulnerability to real-time first-stage personnel, and matching a second-stage known vulnerability and a second-stage unknown vulnerability to real-time second-stage personnel; and sending the matched maintainers and network vulnerabilities to a server.
When the system is used, the network vulnerability detection and identification platform is used for detecting and identifying network vulnerabilities, the server generates relevance analysis signals and sends the relevance analysis signals to the vulnerability relevance analysis unit, and relevance analysis is carried out on each network vulnerability through the vulnerability relevance analysis unit; the server generates a network environment detection signal and sends the network environment detection signal to a network environment detection unit, and the network environment detection unit detects the environment of the current network; the server generates a verification task allocation optimization signal and sends the verification task allocation optimization signal to the verification task allocation optimization unit, and maintenance personnel are reasonably matched through verification of the verification task allocation optimization unit on network vulnerabilities.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (5)

1. The network vulnerability identification and detection system based on the data analysis is characterized by comprising a network vulnerability detection and identification platform, wherein a server is arranged in the network vulnerability detection and identification platform and is in communication connection with a vulnerability relevance analysis unit, a network environment detection unit, a verification task allocation optimization unit and a database;
the network vulnerability detection and recognition platform is used for detecting and recognizing network vulnerabilities, the server generates relevance analysis signals and sends the relevance analysis signals to the vulnerability relevance analysis unit, and relevance analysis is carried out on each network vulnerability through the vulnerability relevance analysis unit; the server generates a network environment detection signal and sends the network environment detection signal to a network environment detection unit, and the network environment detection unit detects the environment of the current network; the server generates a verification task allocation optimization signal and sends the verification task allocation optimization signal to a verification task allocation optimization unit, and maintenance personnel are reasonably matched through verification of the verification task allocation optimization unit on network vulnerabilities;
the vulnerability correlation analysis process of the vulnerability correlation analysis unit is as follows:
marking a network building time as an initial time, constructing a vulnerability analysis time period according to the current time and the initial time, collecting network vulnerabilities appearing in the vulnerability analysis time period, and collecting vulnerability data corresponding to the network vulnerabilities appearing in the vulnerability analysis time period, wherein the vulnerability data comprises influence duration, influence network speed floating values and influence data downloading flow of the vulnerabilities, marking the network vulnerabilities appearing in the vulnerability analysis time period as historical vulnerabilities, setting the labels i and i as natural numbers larger than 1, marking the vulnerability data corresponding to the historical vulnerabilities as influence factors, marking the influence of the influence factors on the network data as influence features, and the influence features are represented as increase of the influence duration of the vulnerabilities, increase of the network speed floating values or decrease of the data downloading flow;
sequencing the collected historical vulnerabilities according to the sequence of the vulnerability analysis time period, constructing a historical vulnerability set, collecting the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets in the historical vulnerability set, and comparing the difference value of the occurrence interval duration of the historical vulnerabilities corresponding to the adjacent subsets and the influence duration of the historical vulnerabilities corresponding to the adjacent subsets with an interval duration threshold and an influence duration difference value respectively;
the comparison process of the difference value of the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets and the difference value of the influence time length with the interval time length threshold value and the influence time length difference value respectively is as follows:
if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is smaller than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset associated vulnerabilities; if the occurrence interval time length of the historical vulnerabilities corresponding to the adjacent subsets is larger than the interval time length threshold value and the influence time length difference value of the historical vulnerabilities corresponding to the adjacent subsets is larger than the influence time length difference value threshold value, binding the historical vulnerabilities corresponding to the adjacent subsets, and marking the bound historical vulnerabilities as preset unassociated vulnerabilities;
comparing the influence factors and the influence characteristics of the preset association loopholes with those of the preset non-association loopholes, and marking the corresponding preset association loopholes as selected association loopholes if the influence factors and the influence characteristics of the preset association loopholes are consistent; if the influence factors and the influence characteristics of the preset association loopholes are inconsistent in comparison, marking the corresponding preset association loopholes as risk association loopholes; if the influence factors and the influence characteristics of the preset non-associated loopholes are consistent in comparison, marking the corresponding preset non-associated loopholes as monitoring associated loopholes; if the comparison of the influence factors and the influence features of the preset non-associated loopholes is inconsistent, marking the corresponding preset non-associated loopholes as selected non-associated loopholes;
sending the selected associated vulnerability, the risk associated vulnerability, the monitoring associated vulnerability and the selected non-associated vulnerability to a server; the server receives the selected association vulnerability, the risk association vulnerability, the monitoring association vulnerability and the non-association vulnerability, then forwards the selected association vulnerability and the non-association vulnerability to the database for storage, meanwhile, detects the risk association vulnerability and the monitoring association vulnerability, and if the number of successive occurrences of the corresponding risk association vulnerability and the monitoring association vulnerability exceeds a corresponding number of times threshold, judges the risk association vulnerability or the monitoring association vulnerability as the selected association vulnerability.
2. The system for identifying and detecting network vulnerabilities based on data analysis of claim 1, wherein the network environment detection process of the network environment detection unit is as follows:
setting a network environment detection time period, collecting network vulnerability screening frequency and the number of network vulnerabilities in a network vulnerability screening period in the network environment detection time period, and comparing the network vulnerability screening frequency and the number of network vulnerabilities in the network vulnerability screening period with a network vulnerability screening frequency threshold and a network vulnerability occurrence number threshold respectively.
3. The system for identifying and detecting network vulnerabilities based on data analysis according to claim 2, wherein the comparison process of the network vulnerability screening frequency and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period with the network vulnerability screening frequency threshold and the number of times of occurrence of the network vulnerabilities threshold in the network environment detection period is as follows:
if the network vulnerability screening frequency exceeds the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period does not exceed the network vulnerability occurrence number threshold, judging that the corresponding network environment is safe, generating a network environment safety signal and sending the network environment safety signal to a server; if the network vulnerability screening frequency does not exceed the network vulnerability screening frequency threshold in the network environment detection time period and the number of times of occurrence of the network vulnerabilities in the network vulnerability screening period exceeds the network vulnerability occurrence number threshold, judging that the corresponding network environment is unsafe, generating a network environment risk signal and sending the network environment risk signal to a server.
4. The network vulnerability identification detection system based on data analysis of claim 1, wherein the verification task allocation optimization process of the verification task allocation optimization unit is as follows:
collecting network loopholes appearing in real time, marking the network loopholes as real-time loopholes, comparing the real-time loopholes with historical loopholes in a database, if the comparison is consistent, acquiring the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes, and comparing the selected association loopholes of the real-time loopholes and the longest maintenance time corresponding to the selected association loopholes with a selected association loophole number threshold and a longest maintenance time threshold respectively:
if the number of the selected associated loopholes of the real-time loopholes exceeds the threshold value of the number of the selected associated loopholes or the longest maintenance duration corresponding to the selected associated loopholes exceeds the threshold value of the longest maintenance duration, marking the corresponding loopholes as first-level known loopholes; if the number of the selected associated loopholes of the real-time loopholes does not exceed the threshold value of the number of the selected associated loopholes and the longest maintenance duration corresponding to the selected associated loopholes does not exceed the threshold value of the longest maintenance duration, marking the corresponding loopholes as secondary known loopholes;
if the comparison is inconsistent, the duration of the influence characteristic corresponding to the real-time vulnerability and the quantity of the influence factors are respectively compared with a duration threshold and a quantity threshold of the influence factors.
5. The system for identifying and detecting network vulnerabilities based on data analysis of claim 4, wherein the comparison process of the duration of the corresponding impact feature of the real-time vulnerabilities and the number of impact factors with the duration threshold and the number of impact factors threshold, respectively, is as follows:
if the duration of the real-time vulnerability corresponding influence features exceeds the duration threshold and the number of influence factors exceeds the influence factor number threshold, marking the corresponding network vulnerability as a first-level unknown vulnerability; if the duration of the real-time vulnerability corresponding influence features does not exceed the duration threshold and the number of influence factors does not exceed the influence factor number threshold, marking the corresponding network vulnerability as a secondary unknown vulnerability;
dividing the real-time idle maintenance personnel according to the maintenance times, and marking the corresponding real-time idle maintenance personnel as real-time primary personnel if the corresponding maintenance times of the real-time idle maintenance personnel exceed a maintenance times threshold value; if the corresponding maintenance times of the maintenance personnel which are idle in real time do not exceed the maintenance times threshold value, marking the maintenance personnel which are idle in real time as real-time secondary personnel;
matching a first-stage known vulnerability and a first-stage unknown vulnerability to real-time first-stage personnel, and matching a second-stage known vulnerability and a second-stage unknown vulnerability to real-time second-stage personnel; and sending the matched maintainers and network vulnerabilities to a server.
CN202210048478.6A 2022-01-17 2022-01-17 Network vulnerability recognition and detection system based on data analysis Active CN114584342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210048478.6A CN114584342B (en) 2022-01-17 2022-01-17 Network vulnerability recognition and detection system based on data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210048478.6A CN114584342B (en) 2022-01-17 2022-01-17 Network vulnerability recognition and detection system based on data analysis

Publications (2)

Publication Number Publication Date
CN114584342A CN114584342A (en) 2022-06-03
CN114584342B true CN114584342B (en) 2024-02-06

Family

ID=81772743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210048478.6A Active CN114584342B (en) 2022-01-17 2022-01-17 Network vulnerability recognition and detection system based on data analysis

Country Status (1)

Country Link
CN (1) CN114584342B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618176A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Website security detection method and device
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion
CN106649429A (en) * 2016-08-25 2017-05-10 北京知道未来信息技术有限公司 Method and device for rapidly evaluating vulnerability hazard level based on multi-dimensional statistics
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system
WO2019047346A1 (en) * 2017-09-11 2019-03-14 平安科技(深圳)有限公司 Website vulnerability scanning method, device, computer device, and storage medium
CN109600371A (en) * 2018-12-08 2019-04-09 公安部第三研究所 A kind of network layer leakage location and method
CN110417751A (en) * 2019-07-10 2019-11-05 腾讯科技(深圳)有限公司 A kind of network safety pre-warning method, device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618176A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Website security detection method and device
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion
CN106649429A (en) * 2016-08-25 2017-05-10 北京知道未来信息技术有限公司 Method and device for rapidly evaluating vulnerability hazard level based on multi-dimensional statistics
WO2019047346A1 (en) * 2017-09-11 2019-03-14 平安科技(深圳)有限公司 Website vulnerability scanning method, device, computer device, and storage medium
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system
CN109600371A (en) * 2018-12-08 2019-04-09 公安部第三研究所 A kind of network layer leakage location and method
CN110417751A (en) * 2019-07-10 2019-11-05 腾讯科技(深圳)有限公司 A kind of network safety pre-warning method, device and storage medium

Also Published As

Publication number Publication date
CN114584342A (en) 2022-06-03

Similar Documents

Publication Publication Date Title
CN111669375B (en) Online safety situation assessment method and system for power industrial control terminal
CN112114995B (en) Terminal abnormality analysis method, device, equipment and storage medium based on process
CN110912884A (en) Detection method, detection equipment and computer storage medium
CN107682317B (en) method for establishing data detection model, data detection method and equipment
CN112953971A (en) Network security traffic intrusion detection method and system
CN113486343A (en) Attack behavior detection method, device, equipment and medium
CN109547496B (en) Host malicious behavior detection method based on deep learning
CN112787984A (en) Vehicle-mounted network anomaly detection method and system based on correlation analysis
CN112333168B (en) Attack identification method, device, equipment and computer readable storage medium
CN111784404B (en) Abnormal asset identification method based on behavior variable prediction
CN114584342B (en) Network vulnerability recognition and detection system based on data analysis
CN113378161A (en) Security detection method, device, equipment and storage medium
CN117336055A (en) Network abnormal behavior detection method and device, electronic equipment and storage medium
CN116389297A (en) Network security event handling and evaluating system
Xiao et al. Alert verification based on attack classification in collaborative intrusion detection
CN104933357A (en) Flooding attack detection system based on data mining
CN112565246A (en) Network anti-attack system and method based on artificial intelligence
CN116319021B (en) Lateral movement detection method and device, electronic equipment and storage medium
CN113055396B (en) Cross-terminal traceability analysis method, device, system and storage medium
CN114780956B (en) Big data analysis-based tracing system
CN117648689B (en) Automatic response method for industrial control host safety event based on artificial intelligence
CN115022097B (en) Public information safety monitoring method and system
CN113239331B (en) Risk account anti-intrusion identification method and system based on big data
CN116260640B (en) Information interception control method and system for big data analysis based on artificial intelligence
CN117473475B (en) Big data security protection method, system and medium based on trusted computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant