Vulnerability mining method and device based on big data, terminal equipment and storage medium

The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering poten...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHOU YONG, GONG WENSHENG, XIONG RUWANG, XIONG WEI, MIAO WEN, CHEN YONGHUA, GONG PENGYAN, CHEN WU, ZHU HAIZHOU, ZHANG PENGJUN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ZHOU YONG
GONG WENSHENG
XIONG RUWANG
XIONG WEI
MIAO WEN
CHEN YONGHUA
GONG PENGYAN
CHEN WU
ZHU HAIZHOU
ZHANG PENGJUN
description The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering potential security risk points and vulnerability clues through association analysis. The vulnerability evaluation value of the target equipment is determined according to the network information, the execution task information, the service interface information and the equipment information, and the feasibility and the harmfulness accuracy of potential vulnerabilities are verified through penetration testing, so that the vulnerabilities of the system can be timely and accurately found, and the vulnerability of the system can be accurately found according to the vulnerability evaluation value, the network information and the execution task information. And determining the vulnerability processing mode corresponding to th
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118797661A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118797661A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118797661A3</originalsourceid><addsrcrecordid>eNqNjLEKwkAQBdNYiPoPa69FEKKWEhQrK7ENm9wzLtztxdxG8O8N4gdYTTMz06y6DV7Rcy1e7E1BVLSlAHtER6yOHF7SgGpOcBSVamnJsfGKDP2osyc8B-kC1L5Bsthzi_HhZAjzbHJnn7D4cZYtT8dreV6jixVSxw0UVpWXPN9t99uiyA-bf5wPY5w8ww</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Vulnerability mining method and device based on big data, terminal equipment and storage medium</title><source>esp@cenet</source><creator>ZHOU YONG ; GONG WENSHENG ; XIONG RUWANG ; XIONG WEI ; MIAO WEN ; CHEN YONGHUA ; GONG PENGYAN ; CHEN WU ; ZHU HAIZHOU ; ZHANG PENGJUN</creator><creatorcontrib>ZHOU YONG ; GONG WENSHENG ; XIONG RUWANG ; XIONG WEI ; MIAO WEN ; CHEN YONGHUA ; GONG PENGYAN ; CHEN WU ; ZHU HAIZHOU ; ZHANG PENGJUN</creatorcontrib><description>The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering potential security risk points and vulnerability clues through association analysis. The vulnerability evaluation value of the target equipment is determined according to the network information, the execution task information, the service interface information and the equipment information, and the feasibility and the harmfulness accuracy of potential vulnerabilities are verified through penetration testing, so that the vulnerabilities of the system can be timely and accurately found, and the vulnerability of the system can be accurately found according to the vulnerability evaluation value, the network information and the execution task information. And determining the vulnerability processing mode corresponding to th</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20241018&amp;DB=EPODOC&amp;CC=CN&amp;NR=118797661A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20241018&amp;DB=EPODOC&amp;CC=CN&amp;NR=118797661A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZHOU YONG</creatorcontrib><creatorcontrib>GONG WENSHENG</creatorcontrib><creatorcontrib>XIONG RUWANG</creatorcontrib><creatorcontrib>XIONG WEI</creatorcontrib><creatorcontrib>MIAO WEN</creatorcontrib><creatorcontrib>CHEN YONGHUA</creatorcontrib><creatorcontrib>GONG PENGYAN</creatorcontrib><creatorcontrib>CHEN WU</creatorcontrib><creatorcontrib>ZHU HAIZHOU</creatorcontrib><creatorcontrib>ZHANG PENGJUN</creatorcontrib><title>Vulnerability mining method and device based on big data, terminal equipment and storage medium</title><description>The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering potential security risk points and vulnerability clues through association analysis. The vulnerability evaluation value of the target equipment is determined according to the network information, the execution task information, the service interface information and the equipment information, and the feasibility and the harmfulness accuracy of potential vulnerabilities are verified through penetration testing, so that the vulnerabilities of the system can be timely and accurately found, and the vulnerability of the system can be accurately found according to the vulnerability evaluation value, the network information and the execution task information. And determining the vulnerability processing mode corresponding to th</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjLEKwkAQBdNYiPoPa69FEKKWEhQrK7ENm9wzLtztxdxG8O8N4gdYTTMz06y6DV7Rcy1e7E1BVLSlAHtER6yOHF7SgGpOcBSVamnJsfGKDP2osyc8B-kC1L5Bsthzi_HhZAjzbHJnn7D4cZYtT8dreV6jixVSxw0UVpWXPN9t99uiyA-bf5wPY5w8ww</recordid><startdate>20241018</startdate><enddate>20241018</enddate><creator>ZHOU YONG</creator><creator>GONG WENSHENG</creator><creator>XIONG RUWANG</creator><creator>XIONG WEI</creator><creator>MIAO WEN</creator><creator>CHEN YONGHUA</creator><creator>GONG PENGYAN</creator><creator>CHEN WU</creator><creator>ZHU HAIZHOU</creator><creator>ZHANG PENGJUN</creator><scope>EVB</scope></search><sort><creationdate>20241018</creationdate><title>Vulnerability mining method and device based on big data, terminal equipment and storage medium</title><author>ZHOU YONG ; GONG WENSHENG ; XIONG RUWANG ; XIONG WEI ; MIAO WEN ; CHEN YONGHUA ; GONG PENGYAN ; CHEN WU ; ZHU HAIZHOU ; ZHANG PENGJUN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118797661A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>ZHOU YONG</creatorcontrib><creatorcontrib>GONG WENSHENG</creatorcontrib><creatorcontrib>XIONG RUWANG</creatorcontrib><creatorcontrib>XIONG WEI</creatorcontrib><creatorcontrib>MIAO WEN</creatorcontrib><creatorcontrib>CHEN YONGHUA</creatorcontrib><creatorcontrib>GONG PENGYAN</creatorcontrib><creatorcontrib>CHEN WU</creatorcontrib><creatorcontrib>ZHU HAIZHOU</creatorcontrib><creatorcontrib>ZHANG PENGJUN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZHOU YONG</au><au>GONG WENSHENG</au><au>XIONG RUWANG</au><au>XIONG WEI</au><au>MIAO WEN</au><au>CHEN YONGHUA</au><au>GONG PENGYAN</au><au>CHEN WU</au><au>ZHU HAIZHOU</au><au>ZHANG PENGJUN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Vulnerability mining method and device based on big data, terminal equipment and storage medium</title><date>2024-10-18</date><risdate>2024</risdate><abstract>The invention is suitable for the technical field of data processing, and provides a big data-based vulnerability mining method and device, terminal equipment and a storage medium, and the method comprises the steps of aggregating information of different heterogeneous sources, and discovering potential security risk points and vulnerability clues through association analysis. The vulnerability evaluation value of the target equipment is determined according to the network information, the execution task information, the service interface information and the equipment information, and the feasibility and the harmfulness accuracy of potential vulnerabilities are verified through penetration testing, so that the vulnerabilities of the system can be timely and accurately found, and the vulnerability of the system can be accurately found according to the vulnerability evaluation value, the network information and the execution task information. And determining the vulnerability processing mode corresponding to th</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN118797661A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Vulnerability mining method and device based on big data, terminal equipment and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T01%3A24%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZHOU%20YONG&rft.date=2024-10-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118797661A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true