Verification method, device and equipment for network equipment vulnerability and storage medium
The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distrib...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab |
---|