Verification method, device and equipment for network equipment vulnerability and storage medium

The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distrib...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHANG DEAN, SHEN HAOBIN, LI RUI, LI XIAOLI, LIU WEILIN, GUO ZHIDA, YAO ZHICHANG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab