CN112822210B - Vulnerability management system based on network assets - Google Patents
Vulnerability management system based on network assets Download PDFInfo
- Publication number
- CN112822210B CN112822210B CN202110165058.1A CN202110165058A CN112822210B CN 112822210 B CN112822210 B CN 112822210B CN 202110165058 A CN202110165058 A CN 202110165058A CN 112822210 B CN112822210 B CN 112822210B
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- module
- information
- detection
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域technical field
本发明属于计算机领域,涉及漏洞系统,特别涉及一种基于网络资产的漏洞管理系统。The invention belongs to the computer field and relates to a vulnerability system, in particular to a network asset-based vulnerability management system.
背景技术Background technique
随着网络技术日新月异的发展,利用计算机网络与资产信息系统相结合,可以实现无纸化办公,有效地提高工作效率。然而网络技术在给人们带来便利的同时,各种网络与资产信息系统上的安全问题也逐渐暴露出来,目前网络资产系统主要依靠人工处理,发现并处理漏洞,随着网络资产系统的日益复杂,资产种类日益繁多,系统维护越发困难,攻击者趁虚而入,入侵系统、篡改页面甚至获取重要的资产数据,导致信息泄露,威胁到整个公司的正常运转。With the rapid development of network technology, the combination of computer network and asset information system can realize paperless office and effectively improve work efficiency. However, while network technology brings convenience to people, security issues in various network and asset information systems are gradually exposed. At present, network asset systems mainly rely on manual processing to discover and deal with loopholes. With the increasing complexity of network asset systems , the types of assets are becoming more and more diverse, and system maintenance is becoming more and more difficult. Attackers take advantage of this opportunity to invade the system, tamper with pages and even obtain important asset data, resulting in information leakage and threatening the normal operation of the entire company.
发明内容Contents of the invention
为了达到上述目的,本发明的在于提供一种基于网络资产的漏洞管理系统,能够自动化的检测整个网络资产,当资产发生变更时,及时进行增量或者完整检测,开发人员根据获取到的检测信息进行查看并修复更新漏洞,发现现有网络资产中面临的潜在威胁,解决网络资产中出现的安全威胁。In order to achieve the above purpose, the present invention is to provide a vulnerability management system based on network assets, which can automatically detect the entire network assets. When the assets change, incremental or complete detection is performed in time. Check and fix and update vulnerabilities, discover potential threats faced by existing network assets, and resolve security threats emerging in network assets.
为实现上述目的,本发明提供如下技术方案:To achieve the above object, the present invention provides the following technical solutions:
一种基于网络资产的漏洞管理系统,基于CPU硬件及网络环境,包括漏洞库模块1、漏洞信息展示模块2、漏洞检索模块3、更新漏洞库模块4以及漏洞库导出模块5;A vulnerability management system based on network assets, based on CPU hardware and network environment, including a
所述漏洞库模块1用于将检测到的漏洞信息进行分类,包括:中国国家信息安全漏洞库CNNVD、国家信息安全漏洞共享平台CNVD、公共漏洞和暴露CVE;The
所述漏洞信息展示模块2用于展示CNNVD、CNVD、CVE三种不同分类下具体的漏洞信息,每条漏洞信息中包含漏洞编号、漏洞描述、发布时间;The vulnerability
所述漏洞检索模块3对漏洞信息进行筛选,并展示在漏洞信息展示模块2中,用户可在漏洞信息展示模块2中直接查看;The vulnerability retrieval module 3 screens the vulnerability information and displays it in the vulnerability
所述更新漏洞库模块4对网络资源进行提取,将获取到有用的信息交给实体管道,实体管道对数据进行过滤、去重,存储到MongoDB数据库中,不断重复这个过程到结束日期停止,完成增量更新检测;The update vulnerability library module 4 extracts network resources, and hands over useful information obtained to the entity pipeline, which filters and deduplicates the data, stores them in the MongoDB database, and repeats this process until the end date stops, and completes Incremental update detection;
所述漏洞库导出模块5用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,选择开始和结束的日期,从MongoDB数据库中导出漏洞。The vulnerability
所述的漏洞检索模块3包括编号检索模块31和关键字检索模块32;所述编号检索模块31用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,采用Scrapy框架中的项目管道Item Pipeline接收漏洞信息,将输入的编号作为条件,对漏洞信息进行筛选,将筛选出来符合条件的信息进行HTML解析并整理,展示在漏洞信息展示模块2中,用户在漏洞信息展示模块2中直接查看;所述关键字检索模块32用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,采用Scrapy框架中的项目管道Item Pipeline接收漏洞信息,将输入的关键字作为条件,对漏洞信息进行筛选,将筛选出来符合条件的信息进行HTML解析并整理,展示在漏洞信息展示模块2中,用户可在漏洞信息展示模块2中直接查看。The vulnerability retrieval module 3 includes a serial
所述更新漏洞库模块4包括完整检测模块41和增量检测模块42;所述完整检测模块41用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,Scrapy引擎发送请求到调度器,调度器将URL地址发送给下载器,下载器将向服务器请求得到的网络资源交给蜘蛛Spider,Spider对网络资源进行提取,将获取到有用的信息交给实体管道,实体管道对数据进行过滤、去重,存储到MongoDB数据库中,不断重复这个过程到最新的日期停止,完成完整更新检测;所述增量检测模块42用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,选择开始检测的日期,Scrapy引擎发送请求到调度器,调度器将URL地址发送给下载器,下载器将向服务器请求得到的网络资源交给蜘蛛Spider,Spider对网络资源进行提取,将获取到有用的信息交给实体管道,实体管道对数据进行过滤、去重,存储到MongoDB数据库中,不断重复这个过程到结束日期停止,完成增量更新检测。The update vulnerability library module 4 includes a
本发明的技术效果和优点:Technical effect and advantage of the present invention:
1、本发明通过Scrapy框架对网络资产进行自动化检测,避免过于依赖人工检测,大大提高了漏洞检测的效率;1. The present invention automatically detects network assets through the Scrapy framework, avoids over-reliance on manual detection, and greatly improves the efficiency of vulnerability detection;
2、本发明通过Scrapy框架和MongoDB数据库相结合,能够不断地对网络资产进行检测并及时更新漏洞库,有效避免了数据库的滞后性,同时也有利于开发人员从MongoDB数据库中导出漏洞信息,对其进行分析,解决安全威胁。2. The present invention combines the Scrapy framework and the MongoDB database to continuously detect network assets and update the vulnerability library in time, effectively avoiding the lag of the database, and also helping developers to export vulnerability information from the MongoDB database. It analyzes and resolves security threats.
附图说明Description of drawings
图1是本发明的整体系统框架结构示意图。Fig. 1 is a schematic diagram of the overall system framework structure of the present invention.
图中:1、漏洞库模块,2、漏洞信息展示模块,3、漏洞检索模块,4、更新漏洞库模块,5、漏洞库导出模块,31、编号检索模块,32、关键字检索模块,41、完整检测模块,42、增量检测模块。In the figure: 1. Vulnerability database module, 2. Vulnerability information display module, 3. Vulnerability retrieval module, 4. Update vulnerability database module, 5. Vulnerability database export module, 31. Number retrieval module, 32. Keyword retrieval module, 41 . Complete detection module, 42. Incremental detection module.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清晰、完整的描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
参照图1,基于网络资产的漏洞管理系统,基于CPU硬件及网络环境,包括漏洞库模块1、漏洞信息展示模块2、漏洞检索模块3、更新漏洞库模块4以及漏洞库导出模块5。Referring to Fig. 1, the vulnerability management system based on network assets, based on CPU hardware and network environment, includes a
所述漏洞信息展示模块2用于展示CNNVD、CNVD、CVE三种不同分类下具体的漏洞信息,每条漏洞信息中包含漏洞编号、漏洞描述、发布时间;The vulnerability
所述漏洞检索模块3包括编号检索模块31和关键字检索模块32;所述编号检索模块31用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,采用Scrapy框架中的ItemPipeline(项目管道)接收漏洞信息,将输入的编号作为条件,对漏洞信息进行筛选,将筛选出来符合条件的信息进行HTML解析并整理,展示在漏洞信息展示模块2中,用户可在漏洞信息展示模块2中直接查看;所述关键字检索模块32用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,采用Scrapy框架中的Item Pipeline(项目管道)接收漏洞信息,将输入的关键字作为条件,对漏洞信息进行筛选,将筛选出来符合条件的信息进行HTML解析并整理,展示在漏洞信息展示模块2中,用户可在漏洞信息展示模块2中直接查看;Described loophole search module 3 comprises serial
所述更新漏洞库模块4包括完整检测模块41和增量检测模块42;所述完整检测模块41用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,Scrapy引擎发送请求到调度器,调度器将URL地址发送给下载器,下载器将向服务器请求得到的网络资源交给Spider(蜘蛛),Spider对网络资源进行提取,将获取到有用的信息交给实体管道,实体管道对数据进行过滤、去重,存储到MongoDB数据库中,不断重复这个过程到最新的日期停止,完成完整更新检测;所述增量检测模块42用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,选择开始检测的日期,Scrapy引擎发送请求到调度器,调度器将URL地址发送给下载器,下载器将向服务器请求得到的网络资源交给Spider(蜘蛛),Spider对网络资源进行提取,将获取到有用的信息交给实体管道,实体管道对数据进行过滤、去重,存储到MongoDB数据库中,不断重复这个过程到结束日期停止,完成增量更新检测;The update vulnerability library module 4 includes a
所述漏洞库导出模块5用于在CNNVD、CNVD、CVE三种不同分类的漏洞库下,选择开始和结束的日期,从MongoDB数据库中导出漏洞。The vulnerability
最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that: the above is only a preferred embodiment of the present invention, and is not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, it still It is possible to modify the technical solutions recorded in the foregoing embodiments, or to perform equivalent replacements on some of the technical features. Any modifications, equivalent replacements, improvements, etc. within the spirit and principles of the present invention shall include Within the protection scope of the present invention.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110165058.1A CN112822210B (en) | 2021-02-06 | 2021-02-06 | Vulnerability management system based on network assets |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110165058.1A CN112822210B (en) | 2021-02-06 | 2021-02-06 | Vulnerability management system based on network assets |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112822210A CN112822210A (en) | 2021-05-18 |
CN112822210B true CN112822210B (en) | 2023-01-03 |
Family
ID=75861945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110165058.1A Active CN112822210B (en) | 2021-02-06 | 2021-02-06 | Vulnerability management system based on network assets |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112822210B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113438248B (en) * | 2021-06-30 | 2022-08-02 | 深圳供电局有限公司 | A self-checking management system for the network IP address of the master station |
CN114218579A (en) * | 2021-11-25 | 2022-03-22 | 中邮信息科技(北京)有限公司 | Vulnerability advanced early warning method and device, electronic equipment and storage medium |
CN117033739A (en) * | 2023-04-19 | 2023-11-10 | 浙江大学 | Incremental extraction and analysis method for large-scale heterogeneous vulnerability data |
KR102598126B1 (en) * | 2023-06-14 | 2023-11-03 | 주식회사 이글루코퍼레이션 | Method and apparatus for managing redundant security threat data in cluster environment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945351A (en) * | 2012-11-05 | 2013-02-27 | 中国科学院软件研究所 | Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment |
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN108985068A (en) * | 2018-06-26 | 2018-12-11 | 广东电网有限责任公司信息中心 | Loophole quick sensing, positioning and the method and system of verifying |
CN112087462A (en) * | 2020-09-11 | 2020-12-15 | 北京顶象技术有限公司 | Vulnerability detection method and device of industrial control system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9990501B2 (en) * | 2015-06-24 | 2018-06-05 | Alcatel Lucent | Diagnosing and tracking product vulnerabilities for telecommunication devices via a database |
-
2021
- 2021-02-06 CN CN202110165058.1A patent/CN112822210B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945351A (en) * | 2012-11-05 | 2013-02-27 | 中国科学院软件研究所 | Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment |
CN107239705A (en) * | 2017-05-25 | 2017-10-10 | 中国东方电气集团有限公司 | A kind of contactless industrial control system or the static leakage location of equipment and detection method |
CN108985068A (en) * | 2018-06-26 | 2018-12-11 | 广东电网有限责任公司信息中心 | Loophole quick sensing, positioning and the method and system of verifying |
CN112087462A (en) * | 2020-09-11 | 2020-12-15 | 北京顶象技术有限公司 | Vulnerability detection method and device of industrial control system |
Also Published As
Publication number | Publication date |
---|---|
CN112822210A (en) | 2021-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112822210B (en) | Vulnerability management system based on network assets | |
US11580680B2 (en) | Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items | |
US11870795B1 (en) | Identifying attack behavior based on scripting language activity | |
US11811805B1 (en) | Detecting fraud by correlating user behavior biometrics with other data sources | |
Stvilia et al. | A framework for information quality assessment | |
US12204619B1 (en) | Multiple input neural networks for detecting fraud | |
US20190007442A1 (en) | System and user context in enterprise threat detection | |
US9659043B2 (en) | Data system and method | |
EP3451201A1 (en) | Processing malicious communications | |
RU2702269C1 (en) | Intelligent control system for cyberthreats | |
CN113556254B (en) | Abnormal alarm method and device, electronic equipment and readable storage medium | |
US20120192286A1 (en) | Privileged Document Identification and Classification System | |
WO2015066509A1 (en) | Methods and systems for malware analysis | |
US20110131247A1 (en) | Semantic Management Of Enterprise Resourses | |
US20220292426A1 (en) | Systems and methods for creating, training, and evaluating models, scenarios, lexicons, and policies | |
US12182090B1 (en) | Systems and methods for generating data transfers using programming language-agnostic data modeling platforms | |
US11315010B2 (en) | Neural networks for detecting fraud based on user behavior biometrics | |
Hsu et al. | Integrated machine learning with semantic web for open government data recommendation based on cloud computing | |
US20220083611A1 (en) | Data management system for web based data services | |
CN115033574A (en) | Information generation method, information generation device, electronic device, and storage medium | |
Nevin et al. | The non-linear impact of data handling on network diffusion models | |
Lin et al. | A survey of provenance in scientific workflow | |
US20190050467A1 (en) | Method and System for Content Creation and Management | |
CN115858276A (en) | Data processing method, data configuration device and computer equipment | |
Kiio | Apache Spark based big data analytics for social network cybercrime forensics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |