Abstract

With the rapid development of computer network technology and the fact that the network brings convenience to people’s lives and work, security issues cannot be ignored. Various countries and social organizations build a network security vulnerability database based on big data analysis technology, use network offensive and defensive platforms to train network security talents, and the target environment as a core component in the offensive and defensive platforms plays an important role in practice. We construct a large network security data set with a security knowledge system, analyze the current construction technology and vulnerability data characteristics of major vulnerability databases at home and abroad from multiple levels, and propose a vulnerability information correlation technology based on a combination of general vulnerability numbers and specific vulnerability numbers. Also, we comprehensively analyze each vulnerability database, assess the comprehensiveness and coverage of the vulnerability data information covered, and establish the source of the vulnerability data, data reference, security content automation protocol support, proof of concept, platform environment affected by the vulnerability exploitation code situation, and other fields of network security big data sets with security knowledge system. Here, we have completed the design and implementation of the user rights management module, the centralized monitoring module, and the service desk and configuration change management module. The system can accurately monitor the operation of the system in real time, find problems in time, warn of potential risks, and promote the operation and maintenance approach to intelligent. The transformation has improved the efficiency of fault diagnosis and greatly enhanced the safety of the system. Experimental research shows that the software system automatically screens and manually confirms the vulnerabilities that meet the target construction environment, and initially constructs a total of 43 effective target environments, which provides security researchers with the understanding of vulnerability principles, hazards, and targeted network security training. A stable and convenient experimental environment.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.