Vulnerability rectification method and device, equipment and storage medium

The invention discloses a vulnerability rectification method and device, equipment and a storage medium, and the method comprises the steps: searching for electronic equipment with vulnerabilities in network security, calculating the candidate time limit of vulnerability rectification for each elect...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LIANG HAOBO, LIU LIYUAN, LIU ZHUOXIAN, LUO JINMAN, ZOU ZHONGLU, FENG YOUJUN, LENG YINGXIONG, YAO ZIRUI, LIU PIAO, LIN HAOZHAO
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a vulnerability rectification method and device, equipment and a storage medium, and the method comprises the steps: searching for electronic equipment with vulnerabilities in network security, calculating the candidate time limit of vulnerability rectification for each electronic equipment according to the hazard level of the vulnerabilities, calculating the characteristic values of each electronic equipment in a plurality of asset dimensions, adjusting the candidate time limit of each electronic device according to the plurality of feature values to obtain a target time limit of vulnerability rectification of each electronic device, issuing a vulnerability rectification task to each electronic device, the vulnerability rectification task requiring to rectify the vulnerability of each electronic device within the target time limit, and sending the vulnerability rectification task to the electronic device. According to the method, the accuracy and the real-time performance of rectifica