Nothing Special   »   [go: up one dir, main page]

CN111310195A - Security vulnerability management method, device, system, equipment and storage medium - Google Patents

Security vulnerability management method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN111310195A
CN111310195A CN202010226681.9A CN202010226681A CN111310195A CN 111310195 A CN111310195 A CN 111310195A CN 202010226681 A CN202010226681 A CN 202010226681A CN 111310195 A CN111310195 A CN 111310195A
Authority
CN
China
Prior art keywords
vulnerability
security
security vulnerability
information
industrial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010226681.9A
Other languages
Chinese (zh)
Inventor
陶耀东
贾新桐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shuangpai Zhian Technology Co ltd
Original Assignee
Beijing Shuangpai Zhian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shuangpai Zhian Technology Co ltd filed Critical Beijing Shuangpai Zhian Technology Co ltd
Priority to CN202010226681.9A priority Critical patent/CN111310195A/en
Publication of CN111310195A publication Critical patent/CN111310195A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of industrial information security, and particularly relates to a security vulnerability management method, device, system, equipment and storage medium. The security vulnerability management method comprises the following steps: acquiring a security vulnerability data set, and screening out industrial information security vulnerabilities from the security vulnerability data set; analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources; and integrating the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library. According to the security vulnerability management method provided by the embodiment of the invention, security vulnerabilities from various different sources are screened, and vulnerability description information is fused aiming at the industrial information security vulnerabilities, so that the description of the same industrial information security vulnerability is more complete, and the security vulnerability library has high availability and information completeness.

Description

Security vulnerability management method, device, system, equipment and storage medium
Technical Field
The invention belongs to the technical field of industrial information security, and particularly relates to a security vulnerability management method, device, system, equipment and storage medium.
Background
A security hole is a defect in hardware, software, a specific implementation of a protocol, or a system security policy, so that an attacker can access or destroy the system without authorization, and in order to reduce or avoid the destruction of the system by the attacker, the security hole is usually collected and researched.
Currently, management of industrial information security vulnerabilities mainly focuses on sub-fields such as vulnerability mining and vulnerability scanning, and values of industrial information security vulnerability libraries in collection, management, operation, service and other aspects are generally ignored. Therefore, the existing technology in the traditional IT field is only required to be collected and processed aiming at the security vulnerabilities in a single aspect, and the vulnerability information integration requirement of multiple sources of the industrial information security vulnerabilities cannot be met.
Therefore, a technology capable of effectively performing integration processing on complex sources of security vulnerabilities of an industrial information system is lacked in the prior art.
Disclosure of Invention
The embodiment of the invention aims to provide a security vulnerability management method, and aims to solve the problem that the prior art cannot effectively integrate and process complex sources of security vulnerabilities of an industrial information system.
The embodiment of the invention is realized in such a way that a security vulnerability management method comprises the following steps:
acquiring security vulnerability data sets of at least two different sources, and screening out industrial information security vulnerabilities from the security vulnerability data sets;
analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and integrating the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
Another objective of an embodiment of the present invention is to provide a security vulnerability management apparatus, including:
the system comprises an industrial information security vulnerability acquisition module, a security vulnerability analysis module and a security vulnerability analysis module, wherein the industrial information security vulnerability acquisition module is used for acquiring security vulnerability data sets of at least two different sources and screening out industrial information security vulnerabilities from the security vulnerability data sets;
the vulnerability description information fusion module is used for analyzing the data structure information of the industrial information security vulnerability and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and the vulnerability set management module is used for collecting the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
Another objective of an embodiment of the present invention is to provide a security vulnerability management system, including:
a vulnerability source platform storing a security vulnerability data set;
and the security vulnerability management device is used for acquiring the security vulnerability data set, screening out industrial information security vulnerabilities according to the security vulnerability data set, and integrating the industrial information security vulnerabilities into a security vulnerability library.
It is another object of the embodiments of the present invention to provide a computer device, which includes a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the steps of the security vulnerability management method.
It is another object of the embodiments of the present invention to provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the processor is enabled to execute the steps of the security vulnerability management method.
According to the security vulnerability management method provided by the embodiment of the invention, security vulnerabilities from various different sources are screened, vulnerability description information is fused aiming at industrial information security vulnerabilities, and the description of the same industrial information security vulnerability is more complete, so that the security vulnerability library has high availability and information completeness.
Drawings
Fig. 1 is an application environment diagram of a security vulnerability management method according to an embodiment of the present invention;
fig. 2 is a flowchart of a security vulnerability management method according to an embodiment of the present invention;
fig. 3 is a flowchart for fusing vulnerability description information according to an embodiment of the present invention;
fig. 4 is a flowchart of determining whether the same industrial information is a security vulnerability according to an embodiment of the present invention;
FIG. 5 is a flowchart of security vulnerabilities dataset acquisition and processing provided by an embodiment of the present invention;
fig. 6 is a block diagram of a security vulnerability management apparatus according to an embodiment of the present invention;
fig. 7 is a block diagram of a vulnerability description information fusion module in the security vulnerability management apparatus according to the embodiment of the present invention;
fig. 8 is a block diagram of a security vulnerability management system according to an embodiment of the present invention;
FIG. 9 is a block diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
Fig. 1 is a diagram of an application environment of a security vulnerability management method according to an embodiment of the present invention, as shown in fig. 1, the application environment includes a terminal 110, a computer device 120, and a vulnerability source platform 130.
The terminal 110 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, and the like.
The computer device 120 may be an independent physical server or terminal, may also be a server cluster formed by a plurality of physical servers, and may be a cloud server providing basic cloud computing services such as a cloud server, a cloud database, a cloud storage, and a CDN.
The vulnerability source platform 130 is specifically a platform for generating or collecting vulnerabilities including industrial information security vulnerabilities and other types of vulnerabilities in various industrial application environments, and may specifically be, for example, an open information security vulnerability library, a vulnerability database mined by internal research of an enterprise, a vulnerability database collected by a vulnerability response platform, and the like.
In the embodiment of the present invention, the terminal 110, the computer device 120, and the vulnerability source platform 130 may perform three-party communication, the security vulnerability management method may be run on the terminal 110 or the computer device 120, the computer device 120 side obtains the security vulnerability data of the vulnerability source platform 130, screens out the industrial information security vulnerabilities, and fuses vulnerability description information of the same industrial information security vulnerability of at least two different sources, so as to integrate the industrial information security vulnerabilities of multiple sources, so that the description information of each industrial information security vulnerability is more comprehensive, and a perfect security vulnerability library is conveniently established.
Example one
As shown in fig. 2, in an embodiment, a security vulnerability management method is provided, and this embodiment is mainly exemplified by applying the method to the computer device 120 in fig. 1. A security vulnerability management method specifically comprises the following steps:
step S202, acquiring security vulnerability data sets of at least two different sources, and screening out industrial information security vulnerabilities from the security vulnerability data sets;
step S204, analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and step S206, collecting the industrial information security vulnerabilities fused with the vulnerability description information into a security vulnerability library.
In the embodiment of the present invention, the source of the security vulnerability data set may be a security vulnerability data set for a certain industrial control system, or may be a security vulnerability database of a plurality of industrial control systems included in the whole enterprise, or may be other security vulnerability databases disclosed by the network, because the industrial control systems and the network sources to which the security vulnerability data set is directed are different, the data structures of substantially the same security vulnerabilities in the security vulnerability data set are different. Specifically, the embodiment of the present invention takes public information security vulnerability database, security vulnerability database mined by enterprise internal research, and security vulnerability database collected by vulnerability response platform as multiple sources of security vulnerability data set for example, and those skilled in the art can understand that the above sources are only used for example, and are not strictly limited to the sources of security vulnerability data set.
Specifically, the public information security vulnerability database commonly used in the field may include platforms from CVE, CNVD, CNNVD, CICSVD, NVD, etc., all of which belong to public vulnerability information publishing platforms, and the data source may be obtained from an official website thereof. The mode of specifically acquiring the security vulnerability data sets of the CVE platform and the CNNVD platform can be a program which is developed by a PYTHON programming language and automatically acquires the XML format file, and the XML file is analyzed according to respective data rules of the vulnerability library.
In addition, for a security vulnerability database excavated by the internal research of an enterprise, a security vulnerability data uploading platform, such as an industrial information security vulnerability information inputting platform, can be used for manually inputting information by security vulnerability management personnel to form a security vulnerability data file with uniform format and standard content. With respect to specific recorded contents, the embodiments of the present invention can be simply listed as follows: the system comprises a unique vulnerability identification, a vulnerability name, vulnerability entry time, vulnerability release time, latest modification description, CVE-ID, CVE-LINK, CNVD-ID, CNVD-LINK, CNNVD-ID, CNNVD-LINK, CICSVD-ID, CICSVD-LINK, NVD-ID, NVD-LINK, hazard level, vulnerability type, vulnerability description, reference LINK, influence equipment, CPE, industry related, patch/independent, patch description, vulnerability LINK, vulnerability score, remark and the like. Of course, the above description is only an example, and those skilled in the art may design the security vulnerability data mined by the internal research of the enterprise autonomously according to the actual situation, and the above description is only explained as the source of the security vulnerability data.
In the embodiment of the invention, the fusion of the vulnerability description information is a processing process for obtaining more accurate and complete security vulnerability description by combining, correlating and combining the vulnerability description information.
Specifically, in an embodiment, as shown in fig. 3, the step S204 may specifically include the following steps:
step S302, judging whether the industrial information security vulnerabilities of at least two different sources belong to the same industrial information security vulnerability of different data structures according to the data structure information, if so, then:
step S304, judging whether the contents of the same description fields in the vulnerability description information of the same industrial information security vulnerability of at least two different sources are consistent, if not, then:
and S306, selecting the content of the same description field according to a preset data structure priority rule to complete the fusion of vulnerability description information.
In the embodiment of the invention, if a meaningful value exists in the same description field in the industrial information security vulnerabilities from at least two different sources in the respective database files, in order to more accurately determine the actual meaning of the field, it is necessary to select and determine a more representative meaning, and the description field is added according to the priority rules of the respective data structures of the industrial information security vulnerabilities in which the different description fields are located. For example, for vulnerability description, the vulnerability description field of the aforementioned vulnerability disclosure platform CNVD has the characteristics of more detail, more accuracy, easier reading and the like compared with other sources, and then the CNVD is set to be the highest in the priority rule of the vulnerability description field, and in this case, the vulnerability description field content of the CNVD is selected to be added to the vulnerability description information of the industrial information security vulnerability to make the same description field definite, so that the description and definition of the industrial information security vulnerability are more representative, and the security vulnerability library is facilitated to be perfected.
In addition, in the embodiment of the present invention, when analyzing the data structure information of the industrial information security vulnerability, because there may exist an industrial information security vulnerability that does not originate from different data structures, such an industrial information security vulnerability may be obtained from only one platform, except that the vulnerability description information of the same industrial information security vulnerability from at least two different sources is fused, the method further includes:
and aggregating the industrial information security vulnerabilities without a different data structure to the security vulnerability library.
In the embodiment of the invention, the industrial information security vulnerabilities with a plurality of sources and a single source are correspondingly processed, so that the industrial information security vulnerabilities can be more comprehensively collected, and the security vulnerability library is richer.
In addition, after the vulnerability information is fused, the vacant part existing after the descriptive information of the industrial information security vulnerability is fused can be filled up by means of single-field information extraction and multi-field joint enrichment, and the purpose of newly adding vulnerability fields and contents thereof can be achieved. For example, in a security vulnerability database mined by enterprise internal research, no record is recorded for the industry fields to which the industrial information security vulnerabilities from multiple sources, and the enrichment of the industry fields to which the enterprise or product is mainly applied can be realized by adding the industry fields in the industry enterprise/product field table in advance.
In an embodiment, as shown in fig. 4, step S302 may specifically include the following steps:
step S402, determining vulnerability numbers of industrial information security vulnerabilities of at least two different sources according to data structure information, wherein if the vulnerability numbers are the same, the at least two industrial information security vulnerabilities are the same industrial information security vulnerability;
step S404, judging whether the data structures of the same industrial information security vulnerabilities of at least two different sources are the same according to the data structure information.
Specifically, for the same industrial information security vulnerability, there are various numbers due to different sources of the vulnerability data sets, for example: CVE number, CNVD number, CNNVD number, etc. The CVE number is the most widely and authoritative vulnerability number actually used in the industry. The database files of the non-CVE data sources all have CVE number fields. Therefore, whether the same industrial information security hole exists can be determined by using the CVE number as a correlation point.
In an embodiment, the step S302 determines, according to the data structure information, whether the industrial information security vulnerabilities of at least two different sources belong to the same industrial information security vulnerability of different data structures, and if yes, the method specifically includes the following steps:
and extracting the description field which only appears in the vulnerability description information of one industrial information security vulnerability, and using the description field as the vulnerability description information of the same industrial information security vulnerability to complete the fusion of vulnerability description information.
In the embodiment of the invention, the description fields appearing in the same industrial information security vulnerability of at least two different sources and appearing in only one industrial information security vulnerability of the two different sources are merged and integrated, so that the same industrial information security vulnerability can be more comprehensively described, and the attribute information of the industrial information security vulnerability can be completely completed.
In an embodiment, as shown in fig. 5, step S202 may specifically include the following steps:
step S502, acquiring security vulnerability data sets of at least two different sources;
step S504, a security vulnerability data set is screened according to a preset industrial information security vulnerability dictionary table, and if vulnerability description information contained in the security vulnerability data set is matched with the content of the industrial information security vulnerability dictionary table, the corresponding security vulnerability is an industrial information security vulnerability.
Specifically, the public information security vulnerability database and the security vulnerability database collected by the vulnerability response platform not only include industrial information security vulnerabilities, but also include a large number of IT field information security vulnerabilities, so that the distinction between the two needs to be realized, and the industrial information security vulnerabilities are accurately extracted. In the embodiment of the invention, the acquired security vulnerability data set is screened and filtered according to the preset industrial information security vulnerability dictionary table, and if the fields of the vulnerability, such as products, manufacturers, vulnerability names and the like, which relate to the product, manufacturer and vulnerability are matched with the dictionary table, the vulnerability is considered as the industrial information security vulnerability.
In addition, the dictionary table of the industrial information security vulnerabilities is used for judging whether a certain vulnerability to be classified is an industrial information security vulnerability or not, and the necessary adjustment is carried out on the dictionary table along with the increase of industrial enterprises and products thereof, the launching of new products of the original industrial enterprises and other situations, and can be realized through the investigation of official product release channels of the industrial manufacturers and an industrial product summarizing platform.
In the embodiment of the invention, for the stages of acquiring the security vulnerability data set, fusing vulnerability description information and the like, continuous operation can be realized by means of setting a timing task and triggering the task. On one hand, an automatic operation task is set, and processes of collecting a security vulnerability data set, screening industrial information security vulnerabilities, fusing vulnerability description information of a plurality of data sources, enriching vulnerability description information and the like can be achieved without manual intervention. On the other hand, the requirement of updating the safe leakage library in real time is met. Wherein, the updating frequency is different for different security vulnerability data set sources, and the corresponding automation task period is also set to a suitable value, which is not further stated herein.
According to the security vulnerability management method provided by the embodiment of the invention, security vulnerabilities from various different sources are screened, vulnerability description information is fused aiming at industrial information security vulnerabilities, and the description of the same industrial information security vulnerability is more complete, so that the security vulnerability library has high availability and information completeness.
Example two
As shown in fig. 6, in an embodiment, a security vulnerability management apparatus is provided, which may be integrated in the computer device 120, and specifically includes:
the industrial information security vulnerability obtaining module 610 is used for obtaining security vulnerability data sets of at least two different sources and screening out industrial information security vulnerabilities from the security vulnerability data sets;
the vulnerability description information fusion module 620 is used for analyzing the data structure information of the industrial information security vulnerability and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and the vulnerability set management module 630 is used for setting the industrial information security vulnerabilities fused with the vulnerability description information into a security vulnerability library.
In the embodiment of the present invention, the source of the security vulnerability data set may be a security vulnerability data set for a certain industrial control system, or may be a security vulnerability database of a plurality of industrial control systems included in the whole enterprise, or may be other security vulnerability databases disclosed by the network, because the industrial control systems and the network sources to which the security vulnerability data set is directed are different, the data structures of substantially the same security vulnerabilities in the security vulnerability data set are different. Specifically, the embodiment of the present invention takes public information security vulnerability database, security vulnerability database mined by enterprise internal research, and security vulnerability database collected by vulnerability response platform as multiple sources of security vulnerability data set for example, and those skilled in the art can understand that the above sources are only used for example, and are not strictly limited to the sources of security vulnerability data set.
Specifically, the foregoing embodiments of the public information security vulnerability database, the security vulnerability database mined by the enterprise internal research, and the security vulnerability database collected by the vulnerability response platform have been described in detail by way of example, and will not be described again.
In the embodiment of the invention, the fusion of the vulnerability description information is a processing process for obtaining more accurate and complete security vulnerability description by combining, correlating and combining the vulnerability description information.
Specifically, in an embodiment, as shown in fig. 7, the vulnerability description information fusion module 620 may specifically include:
the vulnerability identity determination unit 621 is configured to determine, according to the data structure information, whether the industrial information security vulnerabilities of at least two different sources belong to the same industrial information security vulnerability of different data structures, if yes:
the description information determining unit 622 is configured to determine whether contents of the same description field in vulnerability description information of the same industrial information security vulnerability of at least two different sources are consistent, and if not, then:
and the description information fusion unit 623 is configured to select the content of the same description field according to a preset data structure priority rule, so as to complete fusion of vulnerability description information.
In the embodiment of the invention, if a meaningful value exists in the same description field in the industrial information security vulnerabilities from at least two different sources in the respective database files, in order to more accurately determine the actual meaning of the field, it is necessary to select and determine a more representative meaning, and the description field is added according to the priority rules of the respective data structures of the industrial information security vulnerabilities in which the different description fields are located. For example, for vulnerability description, the vulnerability description field of the aforementioned vulnerability disclosure platform CNVD has the characteristics of more detail, more accuracy, easier reading and the like compared with other sources, and then the CNVD is set to be the highest in the priority rule of the vulnerability description field, and in this case, the vulnerability description field content of the CNVD is selected to be added to the vulnerability description information of the industrial information security vulnerability to make the same description field definite, so that the description and definition of the industrial information security vulnerability are more representative, and the security vulnerability library is facilitated to be perfected.
In addition, in the embodiment of the present invention, when analyzing the data structure information of the industrial information security vulnerability, because there may be an industrial information security vulnerability that does not originate from different data structures, such an industrial information security vulnerability may be obtained from only one platform, the vulnerability description information fusion module 620 not only fuses vulnerability description information of the same industrial information security vulnerability from at least two different sources, but also is used for aggregating the industrial information security vulnerability that does not originate from different data structures into the security vulnerability library.
In the embodiment of the invention, the industrial information security vulnerabilities with a plurality of sources and a single source are correspondingly processed, so that the industrial information security vulnerabilities can be more comprehensively collected, and the security vulnerability library is richer.
In addition, after the vulnerability information is fused, the vacant part existing after the descriptive information of the industrial information security vulnerability is fused can be filled up by means of single-field information extraction and multi-field joint enrichment, and the purpose of newly adding vulnerability fields and contents thereof can be achieved. For example, in a security vulnerability database mined by enterprise internal research, no record is recorded for the industry fields to which the industrial information security vulnerabilities from multiple sources, and the enrichment of the industry fields to which the enterprise or product is mainly applied can be realized by adding the industry fields in the industry enterprise/product field table in advance.
In an embodiment, when the vulnerability identity determination unit 621 determines whether the industrial information security vulnerabilities belong to the same industrial information security vulnerability, the vulnerability identity determination unit may specifically include the following steps:
determining vulnerability numbers of industrial information security vulnerabilities of at least two different sources according to the data structure information, wherein if the vulnerability numbers are the same, the at least two industrial information security vulnerabilities are the same industrial information security vulnerability;
and judging whether the data structures of the same industrial information security vulnerabilities of at least two different sources are the same or not according to the data structure information.
Specifically, for the same industrial information security vulnerability, there are various numbers due to different sources of the vulnerability data sets, for example: CVE number, CNVD number, CNNVD number, etc. The CVE number is the most widely and authoritative vulnerability number actually used in the industry. The database files of the non-CVE data sources all have CVE number fields. Therefore, whether the same industrial information security hole exists can be determined by using the CVE number as a correlation point.
In an embodiment, the vulnerability identity determination unit 621 determines whether the industrial information security vulnerabilities from at least two different sources belong to the same industrial information security vulnerability of different data structures, and if yes, the method specifically includes the following steps:
and extracting the description field which only appears in the vulnerability description information of one industrial information security vulnerability, and using the description field as the vulnerability description information of the same industrial information security vulnerability to complete the fusion of vulnerability description information.
In the embodiment of the invention, the description fields appearing in the same industrial information security vulnerability of at least two different sources and appearing in only one industrial information security vulnerability of the two different sources are merged and integrated, so that the same industrial information security vulnerability can be more comprehensively described, and the attribute information of the industrial information security vulnerability can be completely completed.
In an embodiment, the acquiring of the security vulnerability data set and the screening of the industrial information security vulnerability by the industrial information security vulnerability acquiring module 610 may specifically include the following steps:
acquiring security vulnerability data sets of at least two different sources;
and screening the security vulnerability data set according to a preset industrial information security vulnerability dictionary table, and if vulnerability description information contained in the security vulnerability data set is matched with the content of the industrial information security vulnerability dictionary table, determining that the corresponding security vulnerability is an industrial information security vulnerability.
Specifically, the public information security vulnerability database and the security vulnerability database collected by the vulnerability response platform not only include industrial information security vulnerabilities, but also include a large number of IT field information security vulnerabilities, so that the distinction between the two needs to be realized, and the industrial information security vulnerabilities are accurately extracted. In the embodiment of the invention, the acquired security vulnerability data set is screened and filtered according to the preset industrial information security vulnerability dictionary table, and if the fields of the vulnerability, such as products, manufacturers, vulnerability names and the like, which relate to the product, manufacturer and vulnerability are matched with the dictionary table, the vulnerability is considered as the industrial information security vulnerability.
In addition, the dictionary table of the industrial information security vulnerabilities is used for judging whether a certain vulnerability to be classified is an industrial information security vulnerability or not, and the necessary adjustment is carried out on the dictionary table along with the increase of industrial enterprises and products thereof, the launching of new products of the original industrial enterprises and other situations, and can be realized through the investigation of official product release channels of the industrial manufacturers and an industrial product summarizing platform.
In the embodiment of the invention, for the stages of acquiring the security vulnerability data set, fusing vulnerability description information and the like, continuous operation can be realized by means of setting a timing task and triggering the task. On one hand, an automatic operation task is set, and processes of collecting a security vulnerability data set, screening industrial information security vulnerabilities, fusing vulnerability description information of a plurality of data sources, enriching vulnerability description information and the like can be achieved without manual intervention. On the other hand, the requirement of updating the safe leakage library in real time is met. Wherein, the updating frequency is different for different security vulnerability data set sources, and the corresponding automation task period is also set to a suitable value, which is not further stated herein.
According to the security vulnerability management device provided by the embodiment of the invention, security vulnerabilities from various different sources are screened, vulnerability description information is fused aiming at industrial information security vulnerabilities, and the description of the same industrial information security vulnerability is more complete, so that the security vulnerability library has high availability and information completeness.
EXAMPLE III
As shown in fig. 8, in an embodiment, a security vulnerability management system is provided, which specifically includes:
in the embodiment of the invention, the vulnerability source platform can be a public information security vulnerability library 100, a vulnerability database 200 mined by enterprise internal research and a vulnerability database 300 collected by a vulnerability response platform, and the previous embodiments of the vulnerability source platform are described in detail and are not described again in further detail;
the security vulnerability management apparatus 400 in the foregoing embodiment is configured to obtain a security vulnerability data set, screen out an industrial information security vulnerability according to the security vulnerability data set, and aggregate the industrial information security vulnerability into a security vulnerability library.
According to the security vulnerability management system provided by the embodiment of the invention, security vulnerabilities of various vulnerability source platforms are screened, vulnerability description information is fused aiming at industrial information security vulnerabilities, and description of the same industrial information security vulnerability is more complete, so that a security vulnerability library has high availability and information completeness.
Example four
In one embodiment, a computer device is proposed, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
acquiring security vulnerability data sets of at least two different sources, and screening out industrial information security vulnerabilities from the security vulnerability data sets;
analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and integrating the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
FIG. 9 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may be specifically an independent physical server or a terminal, may also be a server cluster formed by a plurality of physical servers, and may be a cloud server providing basic cloud computing services such as a cloud server, a cloud database, a cloud storage, and a CDN. But not limited thereto, the smart phone, the tablet computer, the notebook computer, the desktop computer, the smart speaker, the smart watch, and the like may also be used. As shown in fig. 9, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen linked by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and also stores a computer program, and when the computer program is executed by a processor, the computer program can enable the processor to realize the security vulnerability management method. The internal memory may also store a computer program, and the computer program, when executed by the processor, may cause the processor to perform the security breach management method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
EXAMPLE five
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of:
acquiring security vulnerability data sets of at least two different sources, and screening out industrial information security vulnerabilities from the security vulnerability data sets;
analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and integrating the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A security vulnerability management method is characterized by comprising the following steps:
acquiring security vulnerability data sets of at least two different sources, and screening out industrial information security vulnerabilities from the security vulnerability data sets;
analyzing the data structure information of the industrial information security vulnerability, and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and integrating the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
2. The method according to claim 1, wherein the analyzing the data structure information of the industrial information security vulnerability and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources specifically comprises:
judging whether the industrial information security vulnerabilities of at least two different sources belong to the same industrial information security vulnerability of different data structures according to the data structure information, if so, then:
judging whether the contents of the same description fields in the vulnerability description information of the industrial information security vulnerabilities of at least two different sources are consistent, if not, then:
and selecting the content of the same description field according to a preset data structure priority rule to complete the fusion of vulnerability description information.
3. The method according to claim 2, wherein the determining, according to the data structure information, whether the industrial information security vulnerabilities from at least two different sources belong to a same industrial information security vulnerability of different data structures specifically includes:
determining vulnerability numbers of the industrial information security vulnerabilities of at least two different sources according to the data structure information, wherein if the vulnerability numbers are the same, the at least two industrial information security vulnerabilities are the same industrial information security vulnerability;
and judging whether the data structures of the same industrial information security vulnerabilities of at least two different sources are the same or not according to the data structure information.
4. The method according to claim 2, wherein the determining, according to the data structure information, whether the industrial information security vulnerabilities from at least two different sources belong to a same industrial information security vulnerability of different data structures, if yes, further includes:
and extracting the description field which only appears in the vulnerability description information of one industrial information security vulnerability, and using the description field as the vulnerability description information of the same industrial information security vulnerability to complete the fusion of vulnerability description information.
5. The method according to claim 1, wherein the acquiring of the security vulnerability data sets from at least two different sources and the screening of the industrial information security vulnerability from the security vulnerability data sets specifically comprises:
acquiring security vulnerability data sets of at least two different sources;
and screening the security vulnerability data set according to a preset industrial information security vulnerability dictionary table, and if vulnerability description information contained in the security vulnerability data set is matched with the content of the industrial information security vulnerability dictionary table, determining that the security vulnerability is an industrial information security vulnerability.
6. The method for security vulnerability management according to claim 1, wherein the analyzing the data structure information of the industrial information security vulnerability and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources further comprises:
and aggregating the industrial information security vulnerabilities without a different data structure to the security vulnerability library.
7. A security breach management device, comprising:
the system comprises an industrial information security vulnerability acquisition module, a security vulnerability analysis module and a security vulnerability analysis module, wherein the industrial information security vulnerability acquisition module is used for acquiring security vulnerability data sets of at least two different sources and screening out industrial information security vulnerabilities from the security vulnerability data sets;
the vulnerability description information fusion module is used for analyzing the data structure information of the industrial information security vulnerability and fusing vulnerability description information of the same industrial information security vulnerability from at least two different sources;
and the vulnerability set management module is used for collecting the industrial information security vulnerabilities fused with vulnerability description information into a security vulnerability library.
8. A security breach management system, comprising:
a vulnerability source platform storing a security vulnerability data set;
the security vulnerability management apparatus of claim 7, configured to obtain the security vulnerability data sets from at least two different sources, screen out an industrial information security vulnerability according to the security vulnerability data sets, and aggregate the industrial information security vulnerability into a security vulnerability library.
9. A computer arrangement comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to carry out the steps of the security breach management method of any of claims 1 to 6.
10. A computer-readable storage medium, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of the security breach management method of any of claims 1 to 6.
CN202010226681.9A 2020-03-27 2020-03-27 Security vulnerability management method, device, system, equipment and storage medium Pending CN111310195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010226681.9A CN111310195A (en) 2020-03-27 2020-03-27 Security vulnerability management method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010226681.9A CN111310195A (en) 2020-03-27 2020-03-27 Security vulnerability management method, device, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111310195A true CN111310195A (en) 2020-06-19

Family

ID=71160830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010226681.9A Pending CN111310195A (en) 2020-03-27 2020-03-27 Security vulnerability management method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111310195A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179245A (en) * 2021-03-19 2021-07-27 北京双湃智安科技有限公司 Network security emergency response method, system, computer equipment and storage medium
CN113206823A (en) * 2021-03-19 2021-08-03 北京双湃智安科技有限公司 Industrial information safety monitoring method and device, computer equipment and storage medium
CN113434864A (en) * 2021-06-25 2021-09-24 国汽(北京)智能网联汽车研究院有限公司 Management method and management system for vehicle networking cave depot
CN114021156A (en) * 2022-01-05 2022-02-08 北京华云安信息技术有限公司 Method, device and equipment for organizing vulnerability automatic aggregation and storage medium
CN114817929A (en) * 2022-04-19 2022-07-29 北京天防安全科技有限公司 Method and device for dynamically tracking and processing vulnerability of Internet of things, electronic equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061571A1 (en) * 2005-09-09 2007-03-15 Hammes Peter S System and method for managing security testing
CN1940951A (en) * 2005-09-22 2007-04-04 阿尔卡特公司 Safety loophole information aggregation
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion
CN107609179A (en) * 2017-09-29 2018-01-19 北京神州绿盟信息安全科技股份有限公司 A kind of data processing method and equipment
CN107609402A (en) * 2017-09-05 2018-01-19 中国科学院计算机网络信息中心 A kind of processing method of security breaches, device and storage medium
CN107835153A (en) * 2017-09-29 2018-03-23 桂林电子科技大学 A kind of fragility situation data fusion method
CN110351250A (en) * 2019-06-18 2019-10-18 国家计算机网络与信息安全管理中心 A kind of multi-data source security knowledge collects system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061571A1 (en) * 2005-09-09 2007-03-15 Hammes Peter S System and method for managing security testing
CN1940951A (en) * 2005-09-22 2007-04-04 阿尔卡特公司 Safety loophole information aggregation
CN104836855A (en) * 2015-04-30 2015-08-12 国网四川省电力公司电力科学研究院 Web application safety situation assessment system based on multi-source data fusion
CN107609402A (en) * 2017-09-05 2018-01-19 中国科学院计算机网络信息中心 A kind of processing method of security breaches, device and storage medium
CN107609179A (en) * 2017-09-29 2018-01-19 北京神州绿盟信息安全科技股份有限公司 A kind of data processing method and equipment
CN107835153A (en) * 2017-09-29 2018-03-23 桂林电子科技大学 A kind of fragility situation data fusion method
CN110351250A (en) * 2019-06-18 2019-10-18 国家计算机网络与信息安全管理中心 A kind of multi-data source security knowledge collects system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179245A (en) * 2021-03-19 2021-07-27 北京双湃智安科技有限公司 Network security emergency response method, system, computer equipment and storage medium
CN113206823A (en) * 2021-03-19 2021-08-03 北京双湃智安科技有限公司 Industrial information safety monitoring method and device, computer equipment and storage medium
CN113179245B (en) * 2021-03-19 2023-01-13 北京双湃智安科技有限公司 Network security emergency response method, system, computer equipment and storage medium
CN113434864A (en) * 2021-06-25 2021-09-24 国汽(北京)智能网联汽车研究院有限公司 Management method and management system for vehicle networking cave depot
CN114021156A (en) * 2022-01-05 2022-02-08 北京华云安信息技术有限公司 Method, device and equipment for organizing vulnerability automatic aggregation and storage medium
CN114817929A (en) * 2022-04-19 2022-07-29 北京天防安全科技有限公司 Method and device for dynamically tracking and processing vulnerability of Internet of things, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN111310195A (en) Security vulnerability management method, device, system, equipment and storage medium
CN109446068B (en) Interface test method, device, computer equipment and storage medium
CN110231937B (en) Script defect scanning method, script defect scanning device, computer equipment and storage medium
JP6058246B2 (en) Information processing apparatus, information processing method, and program
CN112861496A (en) Report generation display method and device, computer equipment and readable storage medium
CN110674360B (en) Tracing method and system for data
CN109361628B (en) Message assembling method and device, computer equipment and storage medium
WO2021120628A1 (en) Blockchain-based sensitive word detection method and apparatus, computer device and computer-readable storage medium
CN109542764B (en) Webpage automatic testing method and device, computer equipment and storage medium
US11797617B2 (en) Method and apparatus for collecting information regarding dark web
CN115766258B (en) Multi-stage attack trend prediction method, equipment and storage medium based on causal relationship graph
CN110737719A (en) Data synchronization method, device, equipment and computer readable storage medium
CN113672692B (en) Data processing method, data processing device, computer equipment and storage medium
CN111209061A (en) Method and device for filling in user information, computer equipment and storage medium
CN112148545B (en) Security baseline detection method and security baseline detection system of embedded system
US20220050839A1 (en) Data profiling and monitoring
US11436204B2 (en) Enterprise data flow lineage from enterprise data testing metadata
KR20200077204A (en) System on vulnerability and management of IT devices
CN115145674A (en) Page jump method, device, equipment and medium based on dynamic anchor point
CN110460585B (en) Equipment identity identification method and device, computer equipment and storage medium
CN113038283B (en) Video recommendation method and device and storage medium
CN108959486B (en) Audit field information acquisition method and device, computer equipment and storage medium
CN107741956B (en) Log searching method based on web container configuration file
CN108966154B (en) Method and device for sending short messages in group, computer equipment and storage medium
CN110414228B (en) Computer virus detection method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619