Verification method, device and equipment for network equipment vulnerability and storage medium

The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distrib...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHANG DEAN, SHEN HAOBIN, LI RUI, LI XIAOLI, LIU WEILIN, GUO ZHIDA, YAO ZHICHANG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ZHANG DEAN
SHEN HAOBIN
LI RUI
LI XIAOLI
LIU WEILIN
GUO ZHIDA
YAO ZHICHANG
description The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117097524A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117097524A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117097524A3</originalsourceid><addsrcrecordid>eNqNjDsPAUEYRbdRCP7D6EmsRzZK2RCVSrRrzNzhi3mZx4p_byMKpeokN-eefnE-IZAiwRM5ywzSzckJk2hJgHErGR6ZvIFNTLnALNLThfvP2mZtEfiFNKXX5xGTC_yKLiYpm2HRU1xHjL4cFOPd9ljvp_CuQfRcoIs29aEsq9m6Ws2Xm8U_zhshKj4W</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Verification method, device and equipment for network equipment vulnerability and storage medium</title><source>esp@cenet</source><creator>ZHANG DEAN ; SHEN HAOBIN ; LI RUI ; LI XIAOLI ; LIU WEILIN ; GUO ZHIDA ; YAO ZHICHANG</creator><creatorcontrib>ZHANG DEAN ; SHEN HAOBIN ; LI RUI ; LI XIAOLI ; LIU WEILIN ; GUO ZHIDA ; YAO ZHICHANG</creatorcontrib><description>The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231121&amp;DB=EPODOC&amp;CC=CN&amp;NR=117097524A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231121&amp;DB=EPODOC&amp;CC=CN&amp;NR=117097524A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZHANG DEAN</creatorcontrib><creatorcontrib>SHEN HAOBIN</creatorcontrib><creatorcontrib>LI RUI</creatorcontrib><creatorcontrib>LI XIAOLI</creatorcontrib><creatorcontrib>LIU WEILIN</creatorcontrib><creatorcontrib>GUO ZHIDA</creatorcontrib><creatorcontrib>YAO ZHICHANG</creatorcontrib><title>Verification method, device and equipment for network equipment vulnerability and storage medium</title><description>The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDsPAUEYRbdRCP7D6EmsRzZK2RCVSrRrzNzhi3mZx4p_byMKpeokN-eefnE-IZAiwRM5ywzSzckJk2hJgHErGR6ZvIFNTLnALNLThfvP2mZtEfiFNKXX5xGTC_yKLiYpm2HRU1xHjL4cFOPd9ljvp_CuQfRcoIs29aEsq9m6Ws2Xm8U_zhshKj4W</recordid><startdate>20231121</startdate><enddate>20231121</enddate><creator>ZHANG DEAN</creator><creator>SHEN HAOBIN</creator><creator>LI RUI</creator><creator>LI XIAOLI</creator><creator>LIU WEILIN</creator><creator>GUO ZHIDA</creator><creator>YAO ZHICHANG</creator><scope>EVB</scope></search><sort><creationdate>20231121</creationdate><title>Verification method, device and equipment for network equipment vulnerability and storage medium</title><author>ZHANG DEAN ; SHEN HAOBIN ; LI RUI ; LI XIAOLI ; LIU WEILIN ; GUO ZHIDA ; YAO ZHICHANG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117097524A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ZHANG DEAN</creatorcontrib><creatorcontrib>SHEN HAOBIN</creatorcontrib><creatorcontrib>LI RUI</creatorcontrib><creatorcontrib>LI XIAOLI</creatorcontrib><creatorcontrib>LIU WEILIN</creatorcontrib><creatorcontrib>GUO ZHIDA</creatorcontrib><creatorcontrib>YAO ZHICHANG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZHANG DEAN</au><au>SHEN HAOBIN</au><au>LI RUI</au><au>LI XIAOLI</au><au>LIU WEILIN</au><au>GUO ZHIDA</au><au>YAO ZHICHANG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Verification method, device and equipment for network equipment vulnerability and storage medium</title><date>2023-11-21</date><risdate>2023</risdate><abstract>The invention discloses a network equipment vulnerability verification method and device, equipment and a storage medium. The method comprises the steps that asset distribution information of a target system is acquired, a network equipment topological graph is constructed based on the asset distribution information, and the network equipment topological graph comprises connection links between network equipment; mapping system vulnerabilities of the target system into the network equipment topological graph, and obtaining at least one vulnerability triggering path in the network equipment topological graph when a target hazard result is triggered; and respectively determining the value degree of each vulnerability triggering path causing the target hazard result, and determining a target vulnerability causing the target hazard result in the system vulnerabilities based on the value degree. The method has the beneficial effects that the authenticity of the vulnerability is accurately verified and the vulnerab</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN117097524A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Verification method, device and equipment for network equipment vulnerability and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T06%3A44%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZHANG%20DEAN&rft.date=2023-11-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117097524A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true