CN116578995B - 一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 - Google Patents
一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 Download PDFInfo
- Publication number
- CN116578995B CN116578995B CN202310853988.5A CN202310853988A CN116578995B CN 116578995 B CN116578995 B CN 116578995B CN 202310853988 A CN202310853988 A CN 202310853988A CN 116578995 B CN116578995 B CN 116578995B
- Authority
- CN
- China
- Prior art keywords
- information
- mode
- defense
- security
- attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000012038 vulnerability analysis Methods 0.000 title claims abstract description 18
- 238000004364 calculation method Methods 0.000 claims abstract description 49
- 238000004458 analytical method Methods 0.000 claims abstract description 27
- 238000013507 mapping Methods 0.000 claims abstract description 16
- 238000012937 correction Methods 0.000 claims abstract description 7
- 230000007123 defense Effects 0.000 claims description 254
- 238000004590 computer program Methods 0.000 claims description 10
- 230000035515 penetration Effects 0.000 claims description 10
- 238000010219 correlation analysis Methods 0.000 claims description 9
- 238000013500 data storage Methods 0.000 claims description 2
- 238000012423 maintenance Methods 0.000 abstract description 16
- 239000003795 chemical substances by application Substances 0.000 description 30
- 238000010276 construction Methods 0.000 description 3
- 238000002347 injection Methods 0.000 description 3
- 239000007924 injection Substances 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000002269 spontaneous effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310853988.5A CN116578995B (zh) | 2023-07-13 | 2023-07-13 | 一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310853988.5A CN116578995B (zh) | 2023-07-13 | 2023-07-13 | 一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116578995A CN116578995A (zh) | 2023-08-11 |
CN116578995B true CN116578995B (zh) | 2023-09-15 |
Family
ID=87541688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310853988.5A Active CN116578995B (zh) | 2023-07-13 | 2023-07-13 | 一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116578995B (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871882A (zh) * | 2016-05-10 | 2016-08-17 | 国家电网公司 | 基于网络节点脆弱性和攻击信息的网络安全风险分析方法 |
CN107491694A (zh) * | 2017-08-29 | 2017-12-19 | 西南交通大学 | 用于量化评估scada系统信息安全脆弱性的方法 |
CN109818985A (zh) * | 2019-04-11 | 2019-05-28 | 江苏亨通工控安全研究院有限公司 | 一种工控系统漏洞趋势分析与预警方法及系统 |
CN113688383A (zh) * | 2021-08-31 | 2021-11-23 | 林楠 | 基于人工智能的攻击防御测试方法及人工智能分析系统 |
CN113901484A (zh) * | 2021-11-19 | 2022-01-07 | 国家电网有限公司信息通信分公司 | 一种基于风险的漏洞管理方法和装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070143851A1 (en) * | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
EP3920067B1 (en) * | 2020-06-01 | 2024-05-01 | Tata Consultancy Services Limited | Method and system for machine learning model testing and preventive measure recommendation |
-
2023
- 2023-07-13 CN CN202310853988.5A patent/CN116578995B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871882A (zh) * | 2016-05-10 | 2016-08-17 | 国家电网公司 | 基于网络节点脆弱性和攻击信息的网络安全风险分析方法 |
CN107491694A (zh) * | 2017-08-29 | 2017-12-19 | 西南交通大学 | 用于量化评估scada系统信息安全脆弱性的方法 |
CN109818985A (zh) * | 2019-04-11 | 2019-05-28 | 江苏亨通工控安全研究院有限公司 | 一种工控系统漏洞趋势分析与预警方法及系统 |
CN113688383A (zh) * | 2021-08-31 | 2021-11-23 | 林楠 | 基于人工智能的攻击防御测试方法及人工智能分析系统 |
CN113901484A (zh) * | 2021-11-19 | 2022-01-07 | 国家电网有限公司信息通信分公司 | 一种基于风险的漏洞管理方法和装置 |
Non-Patent Citations (2)
Title |
---|
Tang Shang ; 等.Identification and prevention of impersonation attack based on a new flag byte.《2015 4th International Conference on Computer Science and Network Technology (ICCSNT)》.2015,第972-976页. * |
基于攻击视角完善信息安全弹性防御体系的思考;吕毅;《金融电子化》(第6期);58-60 * |
Also Published As
Publication number | Publication date |
---|---|
CN116578995A (zh) | 2023-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107426227B (zh) | 一种自动化安全渗透测试方法 | |
CN109873811A (zh) | 基于攻击ip画像的网络安全防护方法及其网络安全防护系统 | |
Panaousis et al. | Cybersecurity games and investments: A decision support approach | |
CN108092948A (zh) | 一种网络攻击模式的识别方法和装置 | |
US20210234877A1 (en) | Proactively protecting service endpoints based on deep learning of user location and access patterns | |
CN110474871B (zh) | 一种异常账号检测方法、装置、计算机设备及存储介质 | |
CN110545280B (zh) | 一种基于威胁检测准确度的量化评估方法 | |
CN112615865B (zh) | 基于大数据和人工智能的数据防入侵方法及大数据服务器 | |
CN112235306B (zh) | 一种基于云安全的电子商务账户验证方法 | |
CN110912945B (zh) | 网络攻击入口点的检测方法、装置、电子设备及存储介质 | |
Henniger et al. | On security evaluation of fingerprint recognition systems | |
CN116578995B (zh) | 一种抗攻击的信息安全漏洞分析方法、系统、终端及介质 | |
Durkota et al. | Optimal strategies for detecting data exfiltration by internal and external attackers | |
CN116541815B (zh) | 一种计算机设备运维数据安全管理系统 | |
Islam et al. | {Araña}: Discovering and Characterizing Password Guessing Attacks in Practice | |
CN116993146A (zh) | 一种可快速识别电网敏感数据的系统 | |
CN116094801A (zh) | 一种安全攻击防护方法、装置、设备及可读存储介质 | |
EP3540624A1 (en) | A methodology for anomaly detection of a sequence of computational events associated with a computational system | |
Goicoechea-Telleria et al. | Analysis of the attack potential in low cost spoofing of fingerprints | |
KR101720656B1 (ko) | 안전한 지문 인식 방법 | |
CN111859362A (zh) | 一种移动环境下的多级身份鉴别方法及电子装置 | |
Sawant et al. | Honeywords: Making Password Cracking Detectable | |
Tetskyi | The method of selecting measures to protect the Web application against attacks | |
Ikuomola et al. | A framework for collaborative, adaptive and cost sensitive intrusion response system | |
Thite et al. | Honeyword for security: A review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Hong Zhixu Inventor after: Zhang Kejia Inventor after: Liu Jianchao Inventor after: Zhang Xiaojian Inventor after: Hong Yuxuan Inventor after: Qian Yahui Inventor after: Wang Yang Inventor after: Liu Jinlong Inventor after: Zhou Zhangbao Inventor before: Hong Zhixu Inventor before: Zhang Kejia Inventor before: Liu Jianchao Inventor before: Zhang Xiaojian Inventor before: Hong Yuxuan Inventor before: Qian Yahui Inventor before: Wang Yang Inventor before: Liu Jinlong Inventor before: Zhou Zhangbao |
|
GR01 | Patent grant | ||
GR01 | Patent grant |