Vulnerability mining method and device based on big data, terminal equipment and storage medium

The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering poten...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHOU YONG, GONG WENSHENG, XIONG RUWANG, XIONG WEI, MIAO WEN, CHEN YONGHUA, GONG PENGYAN, CHEN WU, ZHU HAIZHOU, ZHANG PENGJUN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering potential security risk points and vulnerability clues through association analysis. The vulnerability evaluation value of the target equipment is determined according to the network information, the execution task information, the service interface information and the equipment information, and the feasibility and the harmfulness accuracy of potential vulnerabilities are verified through penetration testing, so that the vulnerabilities of the system can be timely and accurately found, and the vulnerability of the system can be accurately found according to the vulnerability evaluation value, the network information and the execution task information. And determining the vulnerability processing mode corresponding to th