HK40030082B - Network security patrol method and apparatus, device and storage medium - Google Patents
Network security patrol method and apparatus, device and storage medium Download PDFInfo
- Publication number
- HK40030082B HK40030082B HK42020020551.6A HK42020020551A HK40030082B HK 40030082 B HK40030082 B HK 40030082B HK 42020020551 A HK42020020551 A HK 42020020551A HK 40030082 B HK40030082 B HK 40030082B
- Authority
- HK
- Hong Kong
- Prior art keywords
- inspection
- project
- application
- sub
- request
- Prior art date
Links
Description
技术领域Technical Field
本申请实施例涉及云技术和网络安全技术领域,特别涉及一种网络安全巡检方法、装置、设备及存储介质。This application relates to the fields of cloud technology and network security technology, and in particular to a network security inspection method, apparatus, device and storage medium.
背景技术Background Technology
技术人员需要对主机的网络安全风险进行检测,掌握主机的网络安全隐患,及时采取有效措施从而确保主机运行在安全的应用交付环境中。Technical personnel need to detect network security risks of the host, identify potential network security vulnerabilities, and take timely and effective measures to ensure that the host runs in a secure application delivery environment.
在相关技术中,技术人员通过web网页方式对主机的网络安全风险进行检测,技术人员在web网页上通过调度攻击机和执行shell、python、go等脚本语言对待检测主机(也可称为目标靶机)进行批量扫描请求,扫描方式可分为单机或分布式扫描。串行防火墙、旁路阻断防火墙等对恶意规则漏洞请求作包过滤,或者发送RST(ReSeT,TCP(TransmissionControl Protocol,传输控制协议)首部中的复位标志)包中断攻击机和待检测主机通信。web网页通过记录攻击机的请求记录和响应记录从而获取到某次扫描请求后待检测主机的安全系统的实际拦截率。In related technologies, technicians detect network security risks of hosts via web pages. On the web page, technicians schedule attack machines and execute scripts such as shell, Python, and Go to send batch scan requests to the host to be detected (also known as the target machine). Scanning methods can be either single-machine or distributed scanning. Serial firewalls and bypass firewalls filter malicious rule vulnerability requests or send RST (Reset flag in the TCP (Transmission Control Protocol) header) packets to interrupt communication between the attack machine and the host to be detected. The web page records the request and response records of the attack machine to obtain the actual interception rate of the host's security system after a particular scan request.
然而,上述相关技术首先需要技术人员安装浏览器,在浏览器中输入网络安全巡检对应的web网页地址,然后在web网页上输入帐号密码,从而进行网络安全巡检,网络安全巡检的准备操作较为繁琐。However, the aforementioned technologies first require technicians to install a browser, enter the web address corresponding to the network security inspection in the browser, and then enter their account and password on the web page to conduct the network security inspection. The preparation process for network security inspection is quite cumbersome.
发明内容Summary of the Invention
本申请实施例提供了一种网络安全巡检方法、装置、设备及存储介质,提高了网络安全巡检准备操作的便捷性。技术方案如下:This application provides a network security inspection method, apparatus, device, and storage medium, which improves the convenience of network security inspection preparation operations. The technical solution is as follows:
根据本申请实施例的一个方面,提供一种网络安全巡检方法,所述方法包括:According to one aspect of the embodiments of this application, a network security inspection method is provided, the method comprising:
在子应用程序中显示项目管理界面,所述项目管理界面中包括至少一个巡检项目的选项,所述子应用程序是依赖于母应用程序运行的程序;The project management interface is displayed in the sub-application, which includes options for at least one inspection item. The sub-application is a program that depends on the parent application to run.
获取针对所述至少一个巡检项目中的目标巡检项目的巡检执行指令;Obtain the inspection execution instruction for the target inspection item in the at least one inspection item;
向服务器发送巡检执行请求,所述巡检执行请求用于请求执行与所述目标巡检项目相关的网络安全巡检;Send an inspection execution request to the server, the inspection execution request being used to request the execution of a network security inspection related to the target inspection item;
接收来自于所述服务器的所述目标巡检项目的巡检结果;Receive the inspection results of the target inspection item from the server;
在所述子应用程序中显示所述巡检结果。The inspection results are displayed in the sub-application.
根据本申请实施例的一个方面,提供一种网络安全巡检方法,其特征在于,所述方法包括:According to one aspect of the embodiments of this application, a network security inspection method is provided, characterized in that the method includes:
接收来自于申请方客户端中的子应用程序的巡检执行请求,所述子应用程序为依赖于母应用程序运行的程序,所述巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检;Receive an inspection execution request from a sub-application in the applicant's client, wherein the sub-application is a program that depends on the parent application to run, and the inspection execution request is used to request the execution of a network security inspection related to the target inspection project;
向云平台发送攻击测试请求,所述攻击测试请求中包括所述目标巡检项目的巡检参数,所述巡检参数用于对目标网络地址进行网络安全巡检;Send an attack test request to the cloud platform. The attack test request includes the inspection parameters of the target inspection item. The inspection parameters are used to perform network security inspection on the target network address.
接收来自于所述云平台的所述目标巡检项目的巡检结果;Receive the inspection results of the target inspection project from the cloud platform;
向所述申请方客户端中的子应用程序发送所述巡检结果。The inspection results are sent to the sub-application in the applicant's client.
根据本申请实施例的一个方面,提供一种网络安全巡检装置,所述装置包括:According to one aspect of the embodiments of this application, a network security inspection device is provided, the device comprising:
界面显示模块,用于在子应用程序中显示项目管理界面,所述项目管理界面中包括至少一个巡检项目的选项,所述子应用程序是依赖于母应用程序运行的程序;The interface display module is used to display a project management interface in a sub-application, the project management interface including at least one inspection item option, the sub-application being a program that depends on the parent application to run;
指令获取模块,用于获取针对所述至少一个巡检项目中的目标巡检项目的巡检执行指令;The instruction acquisition module is used to acquire the inspection execution instruction for the target inspection item in the at least one inspection item;
请求发送模块,用于向服务器发送巡检执行请求,所述巡检执行请求用于请求执行与所述目标巡检项目相关的网络安全巡检;The request sending module is used to send an inspection execution request to the server, wherein the inspection execution request is used to request the execution of a network security inspection related to the target inspection item;
结果接收模块,用于接收来自于所述服务器的所述目标巡检项目的巡检结果;The result receiving module is used to receive the inspection results of the target inspection item from the server.
结果显示模块,用于在所述子应用程序中显示所述巡检结果。The results display module is used to display the inspection results in the sub-application.
根据本申请实施例的一个方面,提供一种网络安全巡检装置,所述装置包括:According to one aspect of the embodiments of this application, a network security inspection device is provided, the device comprising:
请求接收模块,用于接收来自于申请方客户端中的子应用程序的巡检执行请求,所述子应用程序为依赖于母应用程序运行的程序,所述巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检;The request receiving module is used to receive inspection execution requests from sub-applications in the requester's client. The sub-applications are programs that depend on the parent application to run. The inspection execution requests are used to request the execution of network security inspections related to the target inspection project.
请求发送模块,用于向云平台发送攻击测试请求,所述攻击测试请求中包括所述目标巡检项目的巡检参数,所述巡检参数用于对目标网络地址进行网络安全巡检;The request sending module is used to send an attack test request to the cloud platform. The attack test request includes the inspection parameters of the target inspection item. The inspection parameters are used to perform network security inspection on the target network address.
结果接收模块,用于接收来自于所述云平台的所述目标巡检项目的巡检结果;The result receiving module is used to receive the inspection results of the target inspection project from the cloud platform.
结果发送模块,用于向所述申请方客户端中的子应用程序发送所述巡检结果。The result sending module is used to send the inspection results to the sub-application in the applicant client.
根据本申请实施例的一个方面,提供一种计算机设备,所述计算机设备包括处理器和存储器,所述存储器中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由所述处理器加载并执行以实现上述网络安全巡检方法。According to one aspect of the embodiments of this application, a computer device is provided, the computer device including a processor and a memory, the memory storing at least one instruction, at least one program, code set or instruction set, the at least one instruction, the at least one program, the code set or instruction set being loaded and executed by the processor to implement the above-described network security inspection method.
可选地,计算机设备包括终端或服务器。Optionally, the computer equipment includes a terminal or a server.
根据本申请实施例的一个方面,提供一种计算机可读存储介质,所述存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由处理器加载并执行以实现上述网络安全巡检方法。According to one aspect of the embodiments of this application, a computer-readable storage medium is provided, wherein the storage medium stores at least one instruction, at least one program, code set, or instruction set, wherein the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the above-described network security inspection method.
根据本申请实施例的一个方面,提供一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述网络安全巡检方法。According to one aspect of the embodiments of this application, a computer program product or computer program is provided, which includes computer instructions stored in a computer-readable storage medium. A processor of a computer device reads the computer instructions from the computer-readable storage medium and executes the computer instructions, causing the computer device to perform the aforementioned network security inspection method.
本申请实施例提供的技术方案可以带来如下有益效果:The technical solution provided in this application can bring the following beneficial effects:
通过子应用程序实现网络安全巡检功能,由于子应用程序的用户群体广泛,且子应用程序具备无需安装、随时可用、用完即走、无需卸载等便利性,用户仅需打开母应用程序中的子应用程序,直接登录母应用程序的用户帐号信息,就可以在子应用程序中实现网络安全巡检,并不需要输入网络安全巡检对应的web网页地址,更不需要输入帐号密码,提高了网络安全巡检准备操作的便捷性。Implementing network security inspection functions through sub-applications offers several advantages. Sub-applications have a wide user base and offer conveniences such as no installation required, always-available availability, quick access, and no need for uninstallation. Users only need to open the sub-application within the parent application and log in with their parent application's user account information to perform network security inspections within the sub-application. There is no need to enter the corresponding web address for network security inspections, nor is there a need to enter an account password, thus improving the convenience of network security inspection preparation.
附图说明Attached Figure Description
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。To more clearly illustrate the technical solutions in the embodiments of this application, the accompanying drawings used in the description of the embodiments will be briefly introduced below. Obviously, the accompanying drawings described below are only some embodiments of this application. For those skilled in the art, other drawings can be obtained based on these drawings without creative effort.
图1是本申请一个实施例提供的实施环境的示意图;Figure 1 is a schematic diagram of the implementation environment provided in one embodiment of this application;
图2是本申请一个实施例提供的网络安全巡检方法的流程图;Figure 2 is a flowchart of a network security inspection method provided in an embodiment of this application;
图3是本申请一个实施例提供的项目管理界面的示意图;Figure 3 is a schematic diagram of a project management interface provided in one embodiment of this application;
图4是本申请另一个实施例提供的网络安全巡检方法的流程图;Figure 4 is a flowchart of a network security inspection method provided in another embodiment of this application;
图5是本申请一个实施例提供的提交巡检参数的流程示意图;Figure 5 is a flowchart illustrating the submission of inspection parameters according to an embodiment of this application;
图6是本申请另一个实施例提供的网络安全巡检方法的流程图;Figure 6 is a flowchart of a network security inspection method provided in another embodiment of this application;
图7是本申请一个实施例提供的设定动画的示意图;Figure 7 is a schematic diagram of a setting animation provided in one embodiment of this application;
图8是本申请一个实施例提供的结果查询界面的示意图;Figure 8 is a schematic diagram of a result query interface provided in an embodiment of this application;
图9是本申请一个实施例提供的查看巡检报告的流程示意图;Figure 9 is a flowchart illustrating the process of viewing an inspection report according to an embodiment of this application;
图10是本申请另一个实施例提供的网络安全巡检方法的流程图;Figure 10 is a flowchart of a network security inspection method provided in another embodiment of this application;
图11是本申请一个实施例提供的创建巡检项目的流程示意图;Figure 11 is a schematic diagram of the process for creating an inspection project according to an embodiment of this application;
图12是本申请一个实施例提供的项目审批界面的示意图;Figure 12 is a schematic diagram of a project approval interface provided in one embodiment of this application;
图13是本申请一个实施例提供的项目审批的流程示意图;Figure 13 is a schematic diagram of the project approval process provided in one embodiment of this application;
图14是本申请一个实施例提供的项目审批结果的示意图;Figure 14 is a schematic diagram of the project approval result provided in one embodiment of this application;
图15是本申请一个实施例提供的项目审批结果通知消息的示意图;Figure 15 is a schematic diagram of a project approval result notification message provided in an embodiment of this application;
图16是本申请一个实施例提供的项目申请通知消息的示意图;Figure 16 is a schematic diagram of a project application notification message provided in an embodiment of this application;
图17是本申请另一个实施例提供的网络安全巡检方法的流程图;Figure 17 is a flowchart of a network security inspection method provided in another embodiment of this application;
图18是本申请一个实施例提供的项目续期结果的示意图;Figure 18 is a schematic diagram of the project renewal result provided in one embodiment of this application;
图19是本申请另一个实施例提供的网络安全巡检方法的流程图;Figure 19 is a flowchart of a network security inspection method provided in another embodiment of this application;
图20是本申请一个实施例提供的登录子应用程序的流程示意图;Figure 20 is a flowchart of a login sub-application provided in an embodiment of this application;
图21是本申请一个实施例提供的网络安全巡检装置的框图;Figure 21 is a block diagram of a network security inspection device provided in an embodiment of this application;
图22是本申请另一个实施例提供的网络安全巡检装置的框图;Figure 22 is a block diagram of a network security inspection device provided in another embodiment of this application;
图23是本申请另一个实施例提供的网络安全巡检装置的框图;Figure 23 is a block diagram of a network security inspection device provided in another embodiment of this application;
图24是本申请另一个实施例提供的网络安全巡检装置的框图;Figure 24 is a block diagram of a network security inspection device provided in another embodiment of this application;
图25是本申请一个实施例提供的终端的结构框图;Figure 25 is a structural block diagram of a terminal provided in an embodiment of this application;
图26是本申请一个实施例提供的服务器的结构示意图。Figure 26 is a schematic diagram of the structure of a server provided in one embodiment of this application.
具体实施方式Detailed Implementation
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。To make the objectives, technical solutions, and advantages of this application clearer, the embodiments of this application will be described in further detail below with reference to the accompanying drawings.
云技术(Cloud technology)基于云计算商业模式应用的网络技术、信息技术、整合技术、管理平台技术、应用技术等的总称,可以组成资源池,按需所用,灵活便利。云计算技术将变成重要支撑。技术网络系统的后台服务需要大量的计算、存储资源,如视频网站、图片类网站和更多的门户网站。伴随着互联网行业的高度发展和应用,将来每个物品都有可能存在自己的识别标志,都需要传输到后台系统进行逻辑处理,不同程度级别的数据将会分开处理,各类行业数据皆需要强大的系统后盾支撑,能通过云计算来实现。Cloud technology is a collective term for network technologies, information technologies, integration technologies, management platform technologies, and application technologies applied to the cloud computing business model. It can form resource pools, providing flexible and convenient on-demand access. Cloud computing technology will become a crucial support. Backend services of technical network systems require substantial computing and storage resources, such as video websites, image websites, and many portal websites. With the rapid development and application of the internet industry, every item may have its own identification mark in the future, requiring transmission to backend systems for logical processing. Data at different levels will be processed separately, and various industry data will all require robust system support, which can be achieved through cloud computing.
云安全(Cloud Security)是指基于云计算商业模式应用的安全软件、硬件、用户、机构、安全云平台的总称。云安全融合了并行处理、网格计算、未知病毒行为判断等新兴技术和概念,通过网状的大量客户端对网络中软件行为的异常监测,获取互联网中木马、恶意程序的最新信息,并发送到服务端进行自动分析和处理,再把病毒和木马的解决方案分发到每一个客户端。Cloud security refers to the collective term for security software, hardware, users, organizations, and security cloud platforms based on cloud computing business models. Cloud security integrates emerging technologies and concepts such as parallel processing, grid computing, and the identification of unknown virus behavior. Through a large network of clients, it monitors abnormal software behavior on the network, obtains the latest information on Trojans and malware on the internet, sends it to the server for automatic analysis and processing, and then distributes solutions for viruses and Trojans to each client.
云安全主要研究方向包括:1、云计算安全,主要研究如何保障云自身及云上各种应用的安全,包括云计算机系统安全、用户数据的安全存储与隔离、用户接入认证、信息传输安全、网络攻击防护、合规审计等;2、安全基础设施的云化,主要研究如何采用云计算新建与整合安全基础设施资源,优化安全防护机制,包括通过云计算技术构建超大规模安全事件、信息采集与处理平台,实现对海量信息的采集与关联分析,提升全网安全事件把控能力及风险控制能力;3、云安全服务,主要研究各种基于云计算平台为用户提供的安全服务,如防病毒服务等。The main research directions in cloud security include: 1. Cloud computing security, which mainly studies how to ensure the security of the cloud itself and various applications on the cloud, including cloud computer system security, secure storage and isolation of user data, user access authentication, information transmission security, network attack protection, and compliance auditing; 2. Cloudification of security infrastructure, which mainly studies how to use cloud computing to build and integrate security infrastructure resources and optimize security protection mechanisms, including building a large-scale security event and information collection and processing platform through cloud computing technology to achieve the collection and correlation analysis of massive amounts of information and improve the ability to control network-wide security events and risks; 3. Cloud security services, which mainly studies various security services provided to users based on cloud computing platforms, such as antivirus services.
云存储(Cloud storage)是在云计算概念上延伸和发展出来的一个新的概念,分布式云存储系统(以下简称存储系统)是指通过集群应用、网格技术以及分布存储文件系统等功能,将网络中大量各种不同类型的存储设备(存储设备也称之为存储节点)通过应用软件或应用接口集合起来协同工作,共同对外提供数据存储和业务访问功能的一个存储系统。Cloud storage is a new concept that extends and develops from the concept of cloud computing. A distributed cloud storage system (hereinafter referred to as a storage system) refers to a storage system that uses cluster applications, grid technology and distributed storage file systems to bring together a large number of storage devices of various types in the network (storage devices are also called storage nodes) to work together through application software or application interfaces to provide data storage and business access functions to the outside world.
目前,存储系统的存储方法为:创建逻辑卷,在创建逻辑卷时,就为每个逻辑卷分配物理存储空间,该物理存储空间可能是某个存储设备或者某几个存储设备的磁盘组成。客户端在某一逻辑卷上存储数据,也就是将数据存储在文件系统上,文件系统将数据分成许多部分,每一部分是一个对象,对象不仅包含数据而且还包含数据标识(ID,IDentity)等额外的信息,文件系统将每个对象分别写入该逻辑卷的物理存储空间,且文件系统会记录每个对象的存储位置信息,从而当客户端请求访问数据时,文件系统能够根据每个对象的存储位置信息让客户端对数据进行访问。Currently, the storage method in storage systems is as follows: Logical volumes are created, and during creation, physical storage space is allocated to each logical volume. This physical storage space may consist of a single storage device or the disks of several storage devices. Clients store data on a logical volume, which means storing the data on the file system. The file system divides the data into many parts, each part being an object. Each object contains not only the data but also additional information such as a data identifier (ID, IDentity). The file system writes each object to the physical storage space of that logical volume, and it records the storage location information of each object. Therefore, when a client requests access to data, the file system can allow the client to access the data based on the storage location information of each object.
存储系统为逻辑卷分配物理存储空间的过程,具体为:按照对存储于逻辑卷的对象的容量估量(该估量往往相对于实际要存储的对象的容量有很大余量)和独立冗余磁盘阵列(RAID,Redundant Array of Independent Disk)的组别,预先将物理存储空间划分成分条,一个逻辑卷可以理解为一个分条,从而为逻辑卷分配了物理存储空间。The process by which a storage system allocates physical storage space to a logical volume is as follows: the physical storage space is pre-divided into stripes according to the capacity estimate of the objects stored in the logical volume (this estimate often has a large margin relative to the actual capacity of the objects to be stored) and the grouping of Redundant Array of Independent Disks (RAID). A logical volume can be understood as a stripe, thus allocating physical storage space to the logical volume.
数据库(Database),简而言之可视为电子化的文件柜——存储电子文件的处所,用户可以对文件中的数据进行新增、查询、更新、删除等操作。所谓“数据库”是以一定方式储存在一起、能与多个用户共享、具有尽可能小的冗余度、与应用程序彼此独立的数据集合。A database, simply put, can be viewed as an electronic filing cabinet—a place to store electronic files, where users can perform operations such as adding, querying, updating, and deleting data. A "database" is a collection of data stored together in a certain way, capable of being shared by multiple users, with minimal redundancy, and independent of application programs.
数据库管理系统(Database Management System,DBMS)是为管理数据库而设计的电脑软件系统,一般具有存储、截取、安全保障、备份等基础功能。数据库管理系统可以依据它所支持的数据库模型来作分类,例如关系式、XML(Extensible Markup Language,可扩展标记语言);或依据所支持的计算机类型来作分类,例如服务器群集、移动电话;或依据所用查询语言来作分类,例如SQL(Structured Query Language,结构化查询语言)、XQuery;或依据性能冲量重点来作分类,例如最大规模、最高运行速度;亦或其他的分类方式。不论使用哪种分类方式,一些DBMS能够跨类别,例如,同时支持多种查询语言。A Database Management System (DBMS) is a computer software system designed to manage databases, generally possessing basic functions such as storage, retrieval, security, and backup. DBMSs can be classified according to the database model they support, such as relational or XML (Extensible Markup Language); or according to the type of computer they support, such as server clusters or mobile devices; or according to the query language used, such as SQL (Structured Query Language) or XQuery; or according to performance priorities, such as maximum scale or maximum operating speed; or other classification methods. Regardless of the classification method used, some DBMSs can cross categories, for example, simultaneously supporting multiple query languages.
本申请实施例提供的方案涉及网络安全技术领域在云技术领域的应用。The solutions provided in this application relate to the application of network security technology in the field of cloud technology.
请参考图1,其示出了本申请一个实施例提供的实施环境的示意图。该实施环境包括:申请方终端10、审批方终端20、服务器30、云平台40和目标靶机50。Please refer to Figure 1, which shows a schematic diagram of an implementation environment provided in one embodiment of this application. The implementation environment includes: applicant terminal 10, approver terminal 20, server 30, cloud platform 40, and target machine 50.
在本申请实施例中,申请方终端10可以供申请方使用,申请方是指具有创建巡检项目需求,并执行与该巡检项目相关的网络安全巡检的对象;申请方终端10中安装运行有申请方客户端。审批方终端20可以供审批方使用,审批方是指具有审批巡检项目权限的对象,审批方终端20中安装运行有审批方客户端。申请方终端10和审批方终端20可以是诸如手机、平板电脑、可穿戴设备、PC(Personal Computer,个人计算机)等电子设备。In this embodiment, the applicant terminal 10 can be used by the applicant, who refers to an object that has the need to create inspection projects and perform network security inspections related to those projects; the applicant terminal 10 has an applicant client installed and running. The approver terminal 20 can be used by the approver, who refers to an object with the authority to approve inspection projects; the approver terminal 20 has an approver client installed and running. The applicant terminal 10 and the approver terminal 20 can be electronic devices such as mobile phones, tablets, wearable devices, and PCs (Personal Computers).
在一个示例中,申请方客户端和审批方客户端中都运行有子应用程序,该子应用程序是依赖于母应用程序运行的程序,上述申请方客户端和审批方客户端都可以称之为母应用程序,上述子应用程序也可以称为小程序。其中,子应用程序依赖母应用程序运行是指子应用程序不能直接运行于操作系统中,而是运行于母应用程序提供的环境中。也即,子应用程序不能独立运行,而必须依赖母应用程序运行。母应用程序获取子应用程序的逻辑代码文件,对上述逻辑代码文件进行解析,进而显示子应用程序的页面。上述申请方客户端和审批方客户端可以是同一应用程序的客户端,例如,申请方客户端和审批方客户端可以是同一即时通信应用程序的客户端,或者可以是同一社交类应用程序的客户端。子应用程序不能独立运行,但无需下载安装即可使用。用户通过扫描子应用程序对应的二维码或者搜索子应用程序的名称,即可直接打开该子应用程序。子应用程序可以在母应用程序中被便捷地获取和传播。母应用程序是用于承载子应用程序的应用程序,为子应用程序的实现提供环境。母应用程序是原生应用程序。原生应用程序是可直接运行于操作系统的应用程序。母应用程序可以是社交应用程序、专门支持子应用程序的专用应用程序、文件管理应用程序或邮件应用程序等。社交应用程序包括即时通信应用、SNS(Social Network Service,社交网站)应用或者直播应用等。In one example, both the applicant client and the approver client run sub-applications. These sub-applications depend on the parent application to run. Both the applicant client and the approver client can be referred to as the parent application, and the sub-applications can be referred to as mini-programs. The sub-application depending on the parent application means that it cannot run directly on the operating system but runs within the environment provided by the parent application. In other words, the sub-application cannot run independently but must rely on the parent application. The parent application obtains the logic code file of the sub-application, parses it, and then displays the sub-application's page. The applicant client and the approver client can be clients of the same application; for example, they could be clients of the same instant messaging application or the same social networking application. The sub-application cannot run independently but can be used without downloading and installing. Users can directly open the sub-application by scanning its corresponding QR code or searching for its name. The sub-application can be easily obtained and distributed within the parent application. The parent application is the application that hosts the sub-application, providing the environment for its implementation. The parent application is a native application. A native application is an application that can run directly on the operating system. The parent application can be a social application, a dedicated application that supports the child applications, a file management application, or an email application, etc. Social applications include instant messaging applications, SNS (Social Network Service) applications, or live streaming applications, etc.
在另一个示例中,申请方客户端中运行有子应用程序,审批方客户端为应用程序的web网页端,或者是安装在终端上的APP(Application,应用程序)端。In another example, the applicant's client runs a sub-application, and the approver's client is either a web page version of the application or an app (application) installed on the terminal.
在本申请实施例中,服务器30可以是一台服务器,也可以是由多台服务器组成的服务器集群。服务器30可以与申请方客户端中的子应用程序和审批方客户端中的子应用程序进行通信,如服务器30可以对申请方客户端中的子应用程序和审批方客户端中的子应用程序之间的消息进行中转。In this embodiment, server 30 can be a single server or a server cluster consisting of multiple servers. Server 30 can communicate with sub-applications in the applicant's client and the approver's client, such as relaying messages between the sub-applications in the applicant's client and the approver's client.
在本申请实施例中,云平台40用于提供云服务。云平台40可以与服务器30进行通信,如云平台40可以接收服务器30发送的攻击测试请求,该攻击测试请求中包括巡检项目的巡检参数,巡检参数用于对目标靶机50的目标网络地址进行网络安全巡检;云平台40对目标网络攻击地址进行网络安全巡检,得到目标巡检项目的巡检结果;然后云平台40将该巡检结果发送给服务器30,以便服务器30将该巡检结果发送给申请方客户端中的子应用程序。可选地,云平台40中包括云服务器和云数据库,上述攻击测试由云平台40中的云服务器执行,上述巡检结果存储在云平台40中的云数据库中。In this embodiment, cloud platform 40 is used to provide cloud services. Cloud platform 40 can communicate with server 30. For example, cloud platform 40 can receive attack test requests sent by server 30. The attack test request includes inspection parameters for inspection items. The inspection parameters are used to perform network security inspections on the target network address of the target target machine 50. Cloud platform 40 performs network security inspections on the target network attack address and obtains the inspection results of the target inspection items. Then, cloud platform 40 sends the inspection results to server 30, so that server 30 sends the inspection results to the sub-application in the applicant's client. Optionally, cloud platform 40 includes a cloud server and a cloud database. The above attack test is performed by the cloud server in cloud platform 40, and the above inspection results are stored in the cloud database in cloud platform 40.
目标靶机50是指具有网络安全风险检测的主机,目标靶机也可以称之为待检测主机。在可能的实现方式中,目标靶机50中运行有安全系统,本申请实施例能够借助于申请方客户端中的子应用程序实现对目标靶机50中的安全系统的运营环境的检测。Target machine 50 refers to a host with network security risk detection capabilities; it can also be called a host to be detected. In possible implementations, target machine 50 runs a security system. In this embodiment, the operating environment of the security system in target machine 50 can be detected by means of a sub-application in the applicant's client.
下面,将通过几个实施例对本申请进行介绍说明。The present application will now be described through several embodiments.
请参考图2,其示出了本申请一个实施例提供的网络安全巡检方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(201~207):Please refer to Figure 2, which shows a flowchart of a network security inspection method provided in an embodiment of this application. In this embodiment, the method is described in the implementation environment shown in Figure 1. The method may include the following steps (201-207):
步骤201,申请方客户端中的子应用程序显示项目管理界面。Step 201: The sub-application in the applicant's client displays the project management interface.
在本申请实施例中,项目管理界面中包括至少一个巡检项目的选项,子应用程序是依赖于母应用程序运行的程序。此时,母应用程序为上述申请方客户端。In this embodiment, the project management interface includes options for at least one inspection item, and the sub-application is a program that depends on the parent application to run. In this case, the parent application is the aforementioned client application.
在可能的实现方式中,巡检项目的选项以条目的形式在项目管理界面中显示。In one possible implementation, the inspection items are displayed as entries in the project management interface.
步骤202,申请方客户端中的子应用程序获取针对至少一个巡检项目中的目标巡检项目的巡检执行指令。Step 202: The sub-application in the applicant client obtains the inspection execution instruction for the target inspection item in at least one inspection item.
巡检执行指令是指用于请求执行网络安全巡检的指令。目标巡检项目为上述至少一个巡检项目中已审批完成的巡检项目中的任意一个,即目标巡检项目的项目审批结果为已审批通过,且项目有效期状态为有效。An inspection execution instruction is an instruction used to request the execution of a network security inspection. The target inspection item is any one of the inspection items that has been approved and completed among the above-mentioned at least one inspection item, that is, the project approval result of the target inspection item is approved and the project validity status is valid.
如图3所示,其示出了一种项目管理界面的示意图,该项目管理界面300中包括四个巡检项目的选项,分别为:项目名称为“安全POC(Proof of Concept,观点验证程序)”的巡检项目的选项、项目名称为“xx银行”的巡检项目的选项、项目名称为“测试结果”的巡检项目的选项、项目名称为“二三四五”的巡检项目的选项,从项目管理界面300中可以看出项目名称为“测试结果”的巡检项目或项目名称为“二三四五”的巡检项目已审批完成且项目有效期状态有效,因此申请方可以选择项目名称为“测试结果”的巡检项目或选择项目名称为“二三四五”的巡检项目作为目标巡检项目,假设申请方选择项目名称为“二三四五”的巡检项目作为目标巡检项目,则申请方客户端中的子应用程序获取针对项目名称为“二三四五”的巡检项目的巡检执行指令。Figure 3 shows a schematic diagram of a project management interface. The project management interface 300 includes four inspection project options: an inspection project named "Security POC (Proof of Concept)," an inspection project named "xx Bank," an inspection project named "Test Results," and an inspection project named "2345." The project management interface 300 shows that the inspection project named "Test Results" or the inspection project named "2345" has been approved and is valid. Therefore, the applicant can select either the inspection project named "Test Results" or the inspection project named "2345" as the target inspection project. Assuming the applicant selects the inspection project named "2345" as the target inspection project, the sub-application in the applicant's client will obtain the inspection execution instruction for the inspection project named "2345."
步骤203,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 203: The sub-application in the applicant client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。网络安全巡检是指对网络安全风险进行检测,从而掌握网络安全隐患,及时采取有效措施从而保证网络安全。网络安全巡检包括远程安全巡检,例如,可以对待检测主机中的安全系统进行远程安全巡检,从而确定该安全系统是否处于生效状态,若安全系统处于不生效状态,则安装有该安全系统的待检测主机处于危险的网络环境中,容易遭受恶意攻击。当申请方客户端中的子应用程序获取到针对目标巡检项目的巡检执行指令时,向服务器发送巡检执行请求。可选地,巡检执行请求中包括巡检参数,巡检参数用于对目标网络地址进行安全网络巡检,目标网络地址是指目标靶机(待检测主机)对应的网络地址。In this embodiment, the inspection execution request is used to request the execution of a network security inspection related to the target inspection item. Network security inspection refers to detecting network security risks to identify potential threats and take timely and effective measures to ensure network security. Network security inspection includes remote security inspection; for example, a remote security inspection can be performed on the security system in the host to be inspected to determine whether the security system is active. If the security system is inactive, the host to be inspected, which has the security system installed, is in a dangerous network environment and is vulnerable to malicious attacks. When the sub-application in the applicant's client receives the inspection execution instruction for the target inspection item, it sends an inspection execution request to the server. Optionally, the inspection execution request includes inspection parameters, which are used to perform a security network inspection on the target network address, where the target network address refers to the network address corresponding to the target machine (the host to be inspected).
相应地,服务器接收来自于申请方客户端中的子应用程序的巡检执行请求,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives an inspection execution request from a sub-application in the requester's client. The inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
步骤204,服务器向云平台发送攻击测试请求。Step 204: The server sends an attack test request to the cloud platform.
攻击测试请求是指请求向目标网络地址发起攻击测试的请求。在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。当服务器接收到来自于申请方客户端中的子应用程序的巡检执行请求后,服务器会向云平台发送攻击测试请求,云平台用于提供攻击测试服务。在一个示例中,巡检执行请求中包括目标巡检项目的巡检参数,服务器从该巡检执行请求中获取上述目标巡检项目的巡检参数,从而向云平台发送该目标巡检项目的巡检参数;在另一个示例中,服务器自己确定巡检参数,然后将该巡检参数发送给云平台;在又一个示例中,攻击测试请求中不包括目标巡检项目的巡检参数,云平台自己确定巡检参数。An attack test request is a request to initiate an attack test on a target network address. In this embodiment, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspections on the target network address. When the server receives an inspection execution request from a sub-application in the applicant's client, the server sends an attack test request to the cloud platform, which provides attack test services. In one example, the inspection execution request includes inspection parameters for the target inspection item; the server obtains these parameters from the request and sends them to the cloud platform. In another example, the server determines the inspection parameters itself and then sends them to the cloud platform. In yet another example, the attack test request does not include the inspection parameters for the target inspection item, and the cloud platform determines the parameters itself.
步骤205,服务器接收来自于云平台的目标巡检项目的巡检结果。Step 205: The server receives the inspection results of the target inspection project from the cloud platform.
云平台完成攻击测试后,会得到上述目标巡检项目的巡检结果。巡检结果是指对目标网络地址进行网络安全巡检后得到的结果,该巡检结果用于指示目标网络地址所处的网络安全风险,示例性地,巡检结果可以包括以下至少一项:各攻击类型的阻断成功率,整体阻断成功率。各攻击类型的阻断成功率反映了安全系统对该类型攻击的防御能力,阻断成功率越高,表明安全系统对该类型攻击的防御能力越强;整体阻断成功率反映了安全系统对所有测试攻击的整体防御能力,整体阻断成功率越高,表明安全系统整体防御能力越强。在一个示例中,服务器可以向云平台发送结果查询请求,该结果查询请求用于请求获取目标巡检项目的巡检结果;云平台在接收到结果查询请求后,将目标巡检项目的巡检结果发送给服务器。在另一个示例中,云平台主动向服务器推送目标巡检项目的巡检结果。After the cloud platform completes the attack test, it will obtain the inspection results of the aforementioned target inspection items. The inspection results refer to the results obtained after performing network security inspections on the target network address. These results are used to indicate the network security risks of the target network address. For example, the inspection results may include at least one of the following: the blocking success rate for each attack type, and the overall blocking success rate. The blocking success rate for each attack type reflects the security system's defense capability against that type of attack; a higher blocking success rate indicates a stronger defense capability against that type of attack. The overall blocking success rate reflects the security system's overall defense capability against all tested attacks; a higher overall blocking success rate indicates a stronger overall defense capability. In one example, the server can send a result query request to the cloud platform to request the inspection results of the target inspection items. After receiving the result query request, the cloud platform sends the inspection results of the target inspection items to the server. In another example, the cloud platform proactively pushes the inspection results of the target inspection items to the server.
步骤206,服务器向申请方客户端中的子应用程序发送巡检结果。Step 206: The server sends the inspection results to the sub-application in the requester's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的巡检结果。Accordingly, the sub-application in the applicant's client receives the inspection results of the target inspection items from the server.
步骤207,申请方客户端中的子应用程序显示巡检结果。Step 207: The sub-application in the applicant's client displays the inspection results.
申请方客户端中的子应用程序接收到巡检结果后,会在子应用程序的结果查询界面中显示该巡检结果以供申请方查看,该结果查询界面在子应用程序获取到巡检执行指令之后的预设时长内会自己跳转显示。After receiving the inspection results, the sub-application in the applicant's client will display the inspection results in the result query interface of the sub-application for the applicant to view. The result query interface will automatically redirect to the display within a preset time after the sub-application receives the inspection execution instruction.
需要说明的是,本申请实施例仅以申请方客户端中的子应用程序显示巡检结果为例进行介绍说明,在可能的实现方式中,审批方客户端中的子应用程序也可以显示巡检结果,也即,审批方也可以自己新建巡检项目,并接收和显示该巡检项目的巡检结果。在可能的实现方式中,审批方客户端中的子应用程序也可以显示由申请方创建、审批方审批的巡检项目的巡检结果。审批方客户端中的子应用程序显示巡检结果的流程与申请方客户端中的子应用程序显示巡检结果的流程可以一致,本申请实施例对此不再赘述。可选地,审批方自己新建的巡检项目也由自己审批。It should be noted that this embodiment only illustrates the display of inspection results by a sub-application in the applicant's client. In possible implementations, the sub-application in the approver's client can also display inspection results; that is, the approver can also create its own inspection projects and receive and display the inspection results of those projects. In another possible implementation, the sub-application in the approver's client can also display the inspection results of inspection projects created by the applicant and approved by the approver. The process of displaying inspection results by the sub-application in the approver's client can be consistent with that of the sub-application in the applicant's client, and will not be elaborated further in this embodiment. Optionally, the approver can also approve inspection projects created by itself.
综上所述,本申请实施例提供的技术方案中,通过子应用程序实现网络安全巡检功能,由于子应用程序的用户群体广泛,且子应用程序具备无需安装、随时可用、用完即走、无需卸载等便利性,用户仅需打开母应用程序中的子应用程序,直接登录母应用程序的用户帐号信息,就可以在子应用程序中实现网络安全巡检,并不需要输入网络安全巡检对应的web网页地址,更不需要输入帐号密码,提高了网络安全巡检准备操作的便捷性。In summary, the technical solution provided in this application implements network security inspection functions through sub-applications. Since sub-applications have a wide user base and offer conveniences such as no installation required, always available, use and discard, and no uninstallation required, users only need to open the sub-application within the parent application and directly log in with their parent application's user account information to perform network security inspections within the sub-application. There is no need to enter the corresponding web page address for network security inspections, nor is there a need to enter an account password, thus improving the convenience of network security inspection preparation operations.
在示意性实施例中,如图4所示,其示出了本申请另一个实施例提供的网络安全巡检的结果显示方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(401~411):In an illustrative embodiment, as shown in FIG4, a flowchart of a network security inspection result display method provided in another embodiment of this application is illustrated. In this embodiment, the method is described in the implementation environment shown in FIG1. The method may include the following steps (401-411):
步骤401,申请方客户端中的子应用程序显示项目管理界面。Step 401: The sub-application in the applicant's client displays the project management interface.
在本申请实施例中,项目管理界面中包括至少一个巡检项目的选项,子应用程序是依赖于母应用程序运行的程序。In this embodiment of the application, the project management interface includes an option for at least one inspection item, and the sub-application is a program that depends on the parent application to run.
步骤402,申请方客户端中的子应用程序接收针对目标巡检项目的选项的巡检发起指令。Step 402: The sub-application in the applicant client receives the inspection initiation instruction for the options of the target inspection item.
巡检发起指令是指发起网络安全巡检的指令。如图5所示,项目管理界面510中包括四个巡检项目的选项,分别为:项目名称为“安全POC(Proof of Concept,观点验证程序)”的巡检项目的选项、项目名称为“xx银行”的巡检项目的选项、项目名称为“测试结果”的巡检项目的选项、项目名称为“二三四五”的巡检项目的选项。申请方点击与项目名称为“二三四五”的巡检项目的选项对应的“发起巡检”按钮511,触发申请方客户端中的子应用程序接收针对项目名称为“二三四五”的巡检项目的选项的巡检发起指令。The inspection initiation command refers to the command to initiate a network security inspection. As shown in Figure 5, the project management interface 510 includes four inspection project options: an inspection project named "Security POC (Proof of Concept)," an inspection project named "xx Bank," an inspection project named "Test Results," and an inspection project named "2345." When the applicant clicks the "Initiate Inspection" button 511 corresponding to the inspection project option named "2345," the sub-application in the applicant's client receives the inspection initiation command for the inspection project option named "2345."
步骤403,申请方客户端中的子应用程序显示目标巡检项目对应的巡检提交界面。Step 403: The sub-application in the applicant's client displays the inspection submission interface corresponding to the target inspection project.
巡检提交界面是指用于提交巡检参数的界面。每个巡检项目对应的巡检提交界面可以相同,也可以不同,例如,子应用程序显示的巡检提交界面都相同,或者,子应用程序可以根据巡检项目的项目名称个性化显示巡检提交界面。The inspection submission interface refers to the interface used to submit inspection parameters. The inspection submission interface for each inspection item can be the same or different. For example, all sub-applications may display the same inspection submission interface, or the sub-applications may display a personalized inspection submission interface based on the project name of the inspection item.
仍然以上述示例为例,如图5所示,当申请方客户端中的子应用程序接收到针对项目名称为“二三四五”的巡检项目的选项的巡检发起指令后,申请方客户端中的子应用程序显示该项目名称为“二三四五”的巡检项目对应的巡检提交界面520。Taking the above example as an example, as shown in Figure 5, when the sub-application in the applicant's client receives the inspection initiation instruction for the inspection project with the project name "2345", the sub-application in the applicant's client displays the inspection submission interface 520 corresponding to the inspection project with the project name "2345".
项目管理界面中已通过审批方审批的巡检项目的选项,当申请方重新下拉刷新项目管理界面时,与该巡检项目的选项对应的按钮的显示状态会从“待审批”对应转换为“发起巡检”,此时申请方点击“发起巡检”按钮,子应用程序会作界面跳转到巡检提交界面。In the project management interface, for inspection projects that have been approved by the approver, when the applicant refreshes the project management interface, the display status of the button corresponding to the inspection project option will change from "Pending Approval" to "Initiate Inspection". At this time, when the applicant clicks the "Initiate Inspection" button, the sub-application will redirect the interface to the inspection submission interface.
需要说明的是,云平台中的云数据库psg_project集合中项目申请状态字段值不为1时,项目管理界面中不会出现“发起巡检”按钮。It should be noted that when the value of the project application status field in the psg_project collection of the cloud database in the cloud platform is not 1, the "Initiate Inspection" button will not appear in the project management interface.
步骤404,申请方客户端中的子应用程序获取在巡检提交界面中提交的巡检参数。Step 404: The sub-application in the applicant's client obtains the inspection parameters submitted in the inspection submission interface.
在本申请实施例中,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the inspection parameters are used to perform network security inspections on the target network address.
目标网络地址用于指示目标靶机的网络地址,目标靶机是指需要进行网络安全巡检的待检测主机。可选地,目标网络地址包括IP(Internet Protocol,网际协议)地址和端口。The target network address indicates the network address of the target machine, which is the host to be inspected for network security checks. Optionally, the target network address includes an IP (Internet Protocol) address and a port.
在可能的实现方式中,巡检提交界面中包括网络地址输入框和测试用例选择列表,测试用例选择列表中包括至少一个测试用例,测试用例用于指示执行网络安全巡检时的攻击类型。In one possible implementation, the inspection submission interface includes a network address input box and a test case selection list. The test case selection list includes at least one test case, which is used to indicate the type of attack when performing a network security inspection.
子应用程序会调用user_project_querytestcase函数通知服务器遍历拉取云平台中的云数据库psg_attack_type集合中该申请方可执行的测试用例结果信息,该测试用例结果信息主要包括以下至少一项:测试用例对应的添加人、测试用例对应的中文名称、测试用例对应的英文名称、测试用例对应的安全威胁等级、测试用例对应的payload(原始数据)内容、测试用例对应的可用状态等信息,服务器将查询到的上述测试用例结果信息组合成JSON(JavaScriptObject Notation,JS对象简谱)格式的结果集返回给子应用程序作测试用例选择列表展示。测试用例对应的安全威胁等级包括高、中、低,等级越高表明其对目标网络地址的安全威胁越高。测试用例对应的payload内容可以为URL(Uniform ResourceLocator,统一资源定位符)。需要说明的是,测试用例对应的添加人包括:审批方和申请方,审批方添加的测试用例对所有用户可见,申请方在后台添加的测试用例仅对自己可见且要求测试用例对应的可用状态为1(1代表可用且经审批方批准新增,0代表不可用或未经审批方批准新增)时,才对申请方可见,以避免申请方信息越权。The sub-application calls the `user_project_querytestcase` function to instruct the server to iterate through and retrieve the executable test case results from the `psg_attack_type` collection in the cloud database of the cloud platform. This test case result information mainly includes at least one of the following: the person who added the test case, the Chinese name of the test case, the English name of the test case, the security threat level of the test case, the payload (raw data) content of the test case, and the availability status of the test case. The server combines the above-mentioned test case result information into a JSON (JavaScript Object Notation) format result set and returns it to the sub-application as a test case selection list. The security threat level of the test case includes high, medium, and low; a higher level indicates a higher security threat to the target network address. The payload content of the test case can be a URL (Uniform Resource Locator). It should be noted that the people who add test cases include the approver and the applicant. Test cases added by the approver are visible to all users. Test cases added by the applicant in the background are only visible to the applicant and are only visible to the applicant if the availability status of the test case is 1 (1 means available and added with the approval of the approver, 0 means unavailable or added without the approval of the approver), so as to avoid the applicant's information exceeding their authority.
在可能的实现方式中,申请方在子应用程序前端实现测试用例的增删,例如,子应用程序显示测试用例增删界面,子应用程序获取在该测试用例增删界面中提交的第一测试用例;向服务器发送测试用例审批指令,该测试用例审批指令中包括上述第一测试用例;接收服务器返回的测试用例审批结果;根据该测试用例审批结果个性化显示测试用例选择列表。示例性地,该测试用例增删界面中包括至少一个测试用例以及测试用例输入框。子应用程序通过如下方式获取在该测试用例增删界面中提交的第一测试用例:获取在测试用例输入框中提交的新测试用例;接收针对上述至少一个测试用例中的预设测试用例的删除指令,预设测试用例包括至少一个测试用例。In a possible implementation, the applicant adds and deletes test cases on the front end of a sub-application. For example, the sub-application displays a test case add/delete interface, retrieves the first test case submitted in the interface, sends a test case approval instruction to the server, which includes the aforementioned first test case, receives the test case approval result returned by the server, and displays a personalized test case selection list based on the approval result. Exemplarily, the test case add/delete interface includes at least one test case and a test case input box. The sub-application retrieves the first test case submitted in the interface by: retrieving the new test case submitted in the test case input box; and receiving a deletion instruction for a preset test case among the at least one test case, the preset test case including at least one test case.
如图5所示,巡检提交界面520中包括网络地址输入框521和测试用例选择列表522,网络地址输入框521用于供申请方输入目标网络地址,测试用例选择列表522用于供申请方选择测试用例。子应用程序根据云数据库psg_attack_type集合返回的测试用例对应的中文名称生成测试用例选择列表522,可选地,测试用例选择列表522中包括如下测试用例:代码注入、命令注入、JenKins漏洞、Shellshock漏洞、SQL(Structured QueryLanguage,结构化查询语言)注入、漏洞扫描、Elasticsearch漏洞、Struts漏洞、机器批量控制利用。As shown in Figure 5, the inspection submission interface 520 includes a network address input box 521 and a test case selection list 522. The network address input box 521 is used for the applicant to input the target network address, and the test case selection list 522 is used for the applicant to select test cases. The sub-application generates the test case selection list 522 based on the Chinese names corresponding to the test cases returned by the psg_attack_type collection of the cloud database. Optionally, the test case selection list 522 includes the following test cases: code injection, command injection, Jenkins vulnerability, Shellshock vulnerability, SQL (Structured Query Language) injection, vulnerability scanning, Elasticsearch vulnerability, Struts vulnerability, and machine batch control exploitation.
申请方客户端中的子应用程序通过如下方式获取在巡检提交界面中提交的巡检参数:获取在网络地址输入框中输入的目标网络地址;获取在测试用例选择列表中选择的目标测试用例,目标测试用例包括至少一个测试用例;其中,巡检参数包括目标网络地址和目标测试用例。The sub-application in the applicant's client obtains the inspection parameters submitted in the inspection submission interface in the following ways: obtaining the target network address entered in the network address input box; obtaining the target test case selected in the test case selection list, wherein the target test case includes at least one test case; wherein the inspection parameters include the target network address and the target test case.
如图5所示,申请方可以在网络地址输入框521中输入IP地址和端口,在测试用例选择列表522中勾选希望执行的测试用例,如申请方输入的目标网络地址为:192.168.240.51:8979,申请方选择的目标测试用例包括:命令注入、SQL注入、Elasticsearch漏洞。As shown in Figure 5, the applicant can enter the IP address and port in the network address input box 521, and check the test cases to be executed in the test case selection list 522. For example, if the target network address entered by the applicant is 192.168.240.51:8979, the target test cases selected by the applicant include: command injection, SQL injection, and Elasticsearch vulnerability.
步骤405,在接收到针对巡检参数的提交指令时,申请方客户端中的子应用程序确认获取到针对目标巡检项目的巡检执行指令。Step 405: Upon receiving the submission instruction for the inspection parameters, the sub-application in the applicant's client confirms that it has obtained the inspection execution instruction for the target inspection item.
可选地,如图5所示,巡检提交界面520中包括“提交”按钮523,申请方点击该“提交”按钮523触发提交指令,此时子应用程序确认获取到针对目标巡检项目的巡检执行指令。Optionally, as shown in Figure 5, the inspection submission interface 520 includes a "Submit" button 523. When the applicant clicks the "Submit" button 523, a submission instruction is triggered. At this time, the sub-application confirms that it has obtained the inspection execution instruction for the target inspection item.
当申请方在点击网络地址输入框521时,如果申请方曾经没有历史输入的记录,则需要申请方在网络地址输入框521中手动填写对应的目标网络地址,申请方在巡检提交界面520触发点击“提交”按钮523时,子应用程序会作ipv(internet protocol version,网际协议版本)4、ipv6、域名、ipv4+端口、ipv6+端口、域名+端口等6种合法输入的正则表达式匹配,非法的输入则无法提交成功,从而避免该网络地址输入框521被用作恶意内容非法输入用途;如果申请方曾经有在该网络地址输入框521中输入过目标网络地址并通过点击“提交”按钮523成功提交的记录,则子应用程序会在接收到提交指令后后对本次巡检项目提交的目标网络地址作本地缓存记录追加更新,下次该申请方重新点击网络地址输入框521时,子应用程序会从小程序本地缓存中遍历拉取此巡检项目历史曾经提交过的所有目标网络地址以供申请方快速选择执行。When the applicant clicks the network address input box 521, if the applicant has no previous input record, they need to manually enter the corresponding target network address in the network address input box 521. When the applicant clicks the "Submit" button 523 on the inspection submission interface 520, the sub-application will perform regular expression matching for six types of valid inputs: IPv4 (Internet Protocol Version 4), IPv6, domain name, IPv4 + port, IPv6 + port, and domain name + port. Invalid inputs will fail to submit successfully. This prevents the network address input box 521 from being used for malicious or illegal input. If the applicant has previously entered a target network address in the network address input box 521 and successfully submitted it by clicking the "Submit" button 523, the sub-application will update the local cache record of the target network address submitted for this inspection project after receiving the submission instruction. The next time the applicant clicks the network address input box 521 again, the sub-application will retrieve all the target network addresses that have been submitted in the history of this inspection project from the mini-program's local cache for the applicant to quickly select and execute.
子应用程序会调用user_project_submittestcase函数将申请方勾选提交的所有测试用例通知服务器逐一添加到云数据库psg_attack_record集合中并生成对应的自增ID,子应用程序传递给服务器的巡检参数包括以下至少一项:测试用例对应的中文名称、测试用例对应的安全威胁等级、测试用例对应的类型总量、目标网络地址、巡检时间戳、测试用例的payload内容、项目标识、用户标识等。需要说明的是,巡检时间戳需要精确到毫秒,且要求同一巡检项目提交的测试用例此值要保持一致。The sub-application calls the `user_project_submittestcase` function to notify the server to add all test cases selected and submitted by the applicant to the `psg_attack_record` collection in the cloud database one by one and generate corresponding auto-incrementing IDs. The inspection parameters passed by the sub-application to the server include at least one of the following: the Chinese name of the test case, the security threat level of the test case, the total number of test cases of each type, the target network address, the inspection timestamp, the payload content of the test case, the project identifier, and the user identifier. It should be noted that the inspection timestamp needs to be accurate to milliseconds, and this value must be consistent for test cases submitted within the same inspection project.
步骤406,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 406: The sub-application in the applicant client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。巡检执行请求中包括巡检参数。In this embodiment, the inspection execution request is used to request the execution of a network security inspection related to a target inspection item. The inspection execution request includes inspection parameters.
相应地,服务器接收来自于申请方客户端中的子应用程序的巡检执行请求,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives an inspection execution request from a sub-application in the requester's client. The inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
子应用程序采用小程序云开发模式,小程序云开发模式包括三大基础功能支持:(1)云函数:在云平台运行的代码,母应用程序私有协议天然鉴权;(2)云数据库:在子应用程序前端操作,也能在云函数中读写的JSON数据库;(3)云存储:子应用程序前端上传或下载云端文件,在云开发控制台可视化管理。子应用程序的开发者使用母应用程序平台提供的上述三大基础功能提供的API(Application Programming Interface,应用程序接口)定义接口可完成核心的业务逻辑开发。The sub-application adopts the WeChat Mini Program Cloud Development model, which includes three basic functional supports: (1) Cloud Functions: code running on the cloud platform, with natural authentication via the parent application's private protocol; (2) Cloud Databases: JSON databases that can be operated on the front end of the sub-application and read/written in cloud functions; (3) Cloud Storage: files uploaded or downloaded from the cloud by the front end of the sub-application and managed visually in the cloud development console. Developers of the sub-application can use the APIs (Application Programming Interfaces) provided by the three basic functionalities of the parent application platform to define interfaces and complete the core business logic development.
步骤407,服务器向云平台发送攻击测试请求。Step 407: The server sends an attack test request to the cloud platform.
在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspection on the target network address.
在可能的实现方式中,云平台接收到申请方勾选的目标测试用例后,会并发调用小程序云函数commontestcase作攻击测试离线任务调度。其中,commontestcase主要执行的动作包括:远程登录到攻击机;确定每个测试用例对应的攻击类型脚本;通过攻击机并行调用每个测试用例对应的攻击类型脚本向目标网络地址发送攻击测试请求;接收每个测试用例对应的攻击类型脚本返回的相关参数。In one possible implementation, after receiving the target test cases selected by the applicant, the cloud platform concurrently calls the WeChat Mini Program cloud function `commontestcase` to schedule offline attack testing tasks. The main actions performed by `commontestcase` include: remotely logging into the attacking machine; determining the attack type script corresponding to each test case; sending attack test requests to the target network address via the attacking machine's parallel invocation of the attack type script corresponding to each test case; and receiving the relevant parameters returned by the attack type script corresponding to each test case.
云平台根据测试用例对应的英文名称寻找对应的攻击类型脚本向目标网络地址发起wrk压测,wrk压测会执行持续性的攻击测试请求,当攻击测试请求完成后,攻击类型脚本会记录该类型攻击测试请求的相关参数,该相关参数包括攻击测试请求数量、攻击测试成功响应数量(目标网络地址接收到攻击测试请求后向攻击机返回的响应数量)等信息并作回显,对应攻击类型调度的云函数获取攻击类型脚本执行后返回的上述相关参数来进一步计算该测试用例的阻断成功率、阻断失败率,并根据对应测试用例在添加云数据库psg_attack_record集合时生成的自增ID信息作psg_attack_record集合记录精准匹配和字段值更新,主要更新的是该测试用例对应的攻击测试请求数量、该测试用例对应的攻击测试请求阻断成功率、该测试用例对应的攻击测试阻断失败率等3个字段值。需要说明的是,psg_attack_record集合记录未更新前,上述3个字段值默认为0。The cloud platform uses the English name of the test case to find the corresponding attack type script and initiates a wrk load test to the target network address. The wrk load test executes continuous attack test requests. After each attack test request is completed, the attack type script records relevant parameters for that type of attack test request. These parameters include the number of attack test requests and the number of successful attack test responses (the number of responses returned by the target network address to the attacking machine after receiving the attack test request), and displays them. The cloud function scheduled for the corresponding attack type obtains the aforementioned relevant parameters returned after the attack type script is executed to further calculate the blocking success rate and blocking failure rate of the test case. It also performs precise matching and field value updates of the psg_attack_record set records based on the auto-incrementing ID information generated when the corresponding test case was added to the psg_attack_record set. The main updates are to the three fields: the number of attack test requests, the blocking success rate, and the blocking failure rate. It should be noted that before the psg_attack_record set records are updated, the default values of these three fields are 0.
云平台根据相关参数确定目标巡检项目对应的巡检结果,其巡检结果可包括各测试用例对应的阻断成功率,该测试用例对应的阻断成功率通过如下方式确定:确定测试用例对应的攻击测试请求数量与测试用例对应的攻击测试成功响应数量的差值;根据差值与测试用例对应的攻击测试请求数量的比值,确定测试用例对应的阻断成功率。The cloud platform determines the inspection results corresponding to the target inspection item based on relevant parameters. The inspection results may include the blocking success rate corresponding to each test case. The blocking success rate corresponding to the test case is determined as follows: determine the difference between the number of attack test requests corresponding to the test case and the number of successful attack test responses corresponding to the test case; determine the blocking success rate corresponding to the test case based on the ratio of the difference to the number of attack test requests corresponding to the test case.
上述巡检结果还包括整体阻断成功率,云平台根据如下方式确定整体阻断成功率:根据每个测试用例对应的攻击测试请求数量与测试用例对应的阻断成功率的乘积之和,确定第一参数;根据每个测试用例对应的攻击测试请求数量之和,确定第二参数;根据第一参数和第二参数的比值,确定整体阻断成功率。The above inspection results also include the overall blocking success rate. The cloud platform determines the overall blocking success rate as follows: the first parameter is determined by the sum of the products of the number of attack test requests corresponding to each test case and the blocking success rate corresponding to the test case; the second parameter is determined by the sum of the number of attack test requests corresponding to each test case; and the overall blocking success rate is determined by the ratio of the first parameter and the second parameter.
云平台会根据同一巡检项目执行时间戳对应的该批次测试用例作整体阻断成功率计算,整体阻断成功率可通过如下公式计算得到:sum(每个测试用例对应的攻击测试请求数量*该测试用例对应的阻断成功率)/sum(每个测试用例对应的攻击测试请求数量),上述第一参数为sum(每个测试用例对应的攻击测试请求数量*该测试用例对应的阻断成功率),上述第二参数为sum(每个测试用例对应的攻击测试请求数量)。假设目标测试用例包括命令注入和SQL注入,命令注入对应的攻击测试请求数量为数量1、命令注入对应的成功响应数量为数量2,则命令注入对应的阻断成功率为:(数量1-数量2)/数量1。SQL注入对应的阻断成功率的计算方式与此类似,此处不再赘述。整体阻断成功率为:(命令注入对应的攻击测试请求数量*命令注入对应的阻断成功率+SQL注入对应的攻击测试请求数量*SQL注入对应的阻断成功率)/(命令注入对应的攻击测试请求数量+SQL注入对应的攻击测试请求数量)。The cloud platform calculates the overall blocking success rate based on the timestamp of the same inspection project for that batch of test cases. The overall blocking success rate can be calculated using the following formula: sum(number of attack test requests for each test case * blocking success rate for that test case) / sum(number of attack test requests for each test case). The first parameter is sum(number of attack test requests for each test case * blocking success rate for that test case), and the second parameter is sum(number of attack test requests for each test case). Assuming the target test cases include command injection and SQL injection, with 1 attack test request for command injection and 2 successful responses for command injection, the blocking success rate for command injection is: (1 - 2) / 1. The calculation method for the blocking success rate for SQL injection is similar and will not be repeated here. The overall blocking success rate is: (number of attack test requests for command injection * blocking success rate for command injection + number of attack test requests for SQL injection * blocking success rate for SQL injection) / (number of attack test requests for command injection + number of attack test requests for SQL injection).
当该巡检项目的整体阻断成功率低于95%,云平台会判断为目标网络地址的网络环境为高风险,且安全系统运营处于不生效或不健康状态,反之,当该该巡检项目的整体阻断成功率高于95%,云平台会判断为目标网络地址的网络环境为低风险,且安全系统运营处于生效或健康状态;此外,云平台会判断某一巡检项目的所有测试用例对应的攻击测试请求数量、测试用例对应的阻断成功率这两个字段值是否有同时为0的情况存在,如果存在同时为0的情况则代表该巡检项目的测试用例的离线巡检任务还未全部完成,此时,返回给子应用程序的巡检测试用例计算结果集中需要对该巡检项目添加巡检状态为“进行中”,否则巡检测试用例计算结果集中默认在该巡检项目添加巡检状态为“已完成”。服务器会将此计算的所有结果组成JSON格式返回给子应用程序作巡检项目的巡检结果展示。When the overall blocking success rate of an inspection project is below 95%, the cloud platform will determine that the network environment of the target network address is high-risk, and the security system is ineffective or unhealthy. Conversely, when the overall blocking success rate of the inspection project is above 95%, the cloud platform will determine that the network environment of the target network address is low-risk, and the security system is effective or healthy. Furthermore, the cloud platform will check if the values of the attack test request count and the blocking success rate corresponding to all test cases for a certain inspection project are both 0. If both are 0, it means that the offline inspection tasks for the test cases of that inspection project have not been fully completed. In this case, the inspection test case calculation result set returned to the sub-application needs to add the inspection status of the inspection project to "in progress"; otherwise, the inspection test case calculation result set will default to adding the inspection status of the inspection project to "completed". The server will assemble all the calculation results into JSON format and return them to the sub-application for displaying the inspection results of the inspection project.
在可能的实现方式中,巡检结果包括以下至少一项:整体阻断成功率、各个测试用例对应的阻断成功率、各个测试用例对应的攻击测试请求数量、各个测试用例对应的安全威胁等级。In possible implementations, the inspection results include at least one of the following: overall blocking success rate, blocking success rate for each test case, number of attack test requests for each test case, and security threat level for each test case.
本申请利用云函数作巡检测试用例并发调度,提升了相关技术中实现高并发调度机制设计的效率。This application utilizes cloud functions as a trial example for concurrent scheduling in patrol detection, thereby improving the efficiency of designing high-concurrency scheduling mechanisms in related technologies.
步骤408,服务器向云平台中的云数据库发送结果查询请求。Step 408: The server sends a result query request to the cloud database in the cloud platform.
在本申请实施例中,结果查询请求中包括目标巡检项目的标识,云数据库中存储有至少一个巡检项目的巡检结果。In this embodiment of the application, the result query request includes the identifier of the target inspection item, and the cloud database stores the inspection results of at least one inspection item.
可选地,云数据库中存储有至少一个对应关系,该对应关系为巡检项目的标识与该巡检项目的巡检结果之间的对应关系。云平台接收到服务器发送的结果查询请求后,在云数据库中根据该目标巡检项目的标识,查询上述至少一个对应关系,获取到目标巡检项目的巡检结果。云数据库查询到目标巡检项目的巡检结果后,向服务器发送该目标巡检项目的巡检结果。Optionally, the cloud database stores at least one correspondence, which is the correspondence between the identifier of an inspection project and the inspection result of that inspection project. After receiving a result query request from the server, the cloud platform queries the cloud database for at least one of the above correspondences based on the identifier of the target inspection project to obtain the inspection result of the target inspection project. After retrieving the inspection result of the target inspection project, the cloud database sends the inspection result of the target inspection project to the server.
步骤409,服务器接收来自于云数据库的目标巡检项目的巡检结果。Step 409: The server receives the inspection results of the target inspection project from the cloud database.
步骤410,服务器向申请方客户端中的子应用程序发送巡检结果。Step 410: The server sends the inspection results to the sub-application in the requester's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的巡检结果。Accordingly, the sub-application in the applicant's client receives the inspection results of the target inspection items from the server.
步骤411,申请方客户端中的子应用程序显示巡检结果。Step 411: The sub-application in the applicant's client displays the inspection results.
有关步骤410至411的介绍说明可参见上文实施例,此处不再赘述。For a description of steps 410 to 411, please refer to the above embodiments; they will not be repeated here.
综上所述,本申请实施例提供的技术方案中,利用云函数作巡检测试用例并发调度,提升了相关技术中实现高并发调度机制设计的效率。In summary, the technical solution provided in this application uses cloud functions as a trial example for concurrent scheduling of patrol detection, which improves the efficiency of designing high-concurrency scheduling mechanisms in related technologies.
另外,本申请实施例借助子应用程序载体实现个人项目管理、测试用例管理和利用云函数功能远程登录调度攻击机对目标网络地址(目标靶机所在的网络地址)进行恶意规则漏洞测试。安全系统如串行防火墙、旁路阻断防火墙在检测到恶意规则漏洞请求后会坐攻击机请求包的丢弃或发送RST包中断攻击机与目标靶机之间的连接。本申请实施例通过统计恶意请求包的响应成功率来验证安全系统是否在健康运行和安全系统是否有记录到恶意请求包和告警记录来达到安全系统远程巡检的目的。Furthermore, this application embodiment utilizes a sub-application carrier to achieve personal project management, test case management, and remote login scheduling of the attacking machine using cloud functions to perform malicious rule vulnerability testing on the target network address (the network address where the target machine is located). Security systems such as serial firewalls and bypass firewalls, upon detecting a malicious rule vulnerability request, will either drop the attacking machine's request packet or send an RST packet to interrupt the connection between the attacking machine and the target machine. This application embodiment verifies whether the security system is operating healthily and whether the security system has recorded malicious request packets and alarm records by statistically analyzing the success rate of malicious request packet responses, thereby achieving the purpose of remote security system inspection.
在示意性实施例中,如图6所示,其示出了本申请另一个实施例提供的网络安全巡检方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(601~613):In an illustrative embodiment, as shown in FIG6, a flowchart of a network security inspection method provided in another embodiment of this application is illustrated. In this embodiment, the method is described in the implementation environment shown in FIG1. The method may include the following steps (601-613):
步骤601,申请方客户端中的子应用程序显示项目管理界面。Step 601: The sub-application in the applicant's client displays the project management interface.
在本申请实施例中,项目管理界面中包括至少一个巡检项目的选项,子应用程序是依赖于母应用程序运行的程序。In this embodiment of the application, the project management interface includes an option for at least one inspection item, and the sub-application is a program that depends on the parent application to run.
步骤602,申请方客户端中的子应用程序获取针对至少一个巡检项目中的目标巡检项目的巡检执行指令。Step 602: The sub-application in the applicant client obtains the inspection execution instruction for the target inspection item in at least one inspection item.
步骤603,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 603: The sub-application in the applicant's client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。In this embodiment of the application, the inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
相应地,服务器接收申请方客户端中的子应用程序发送的巡检执行请求,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives an inspection execution request sent by a sub-application in the requesting client. The inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
步骤604,服务器向云平台发送攻击测试请求。Step 604: The server sends an attack test request to the cloud platform.
在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspection on the target network address.
有关步骤601至步骤604的介绍说明可参见上文实施例,此处不再赘述。For a description of steps 601 to 604, please refer to the above embodiments, which will not be repeated here.
步骤605,申请方客户端中的子应用程序播放设定动画。Step 605: The sub-application in the applicant's client plays the setup animation.
由于网络安全巡检是异步离线执行的,因此,申请方客户端中的子应用程序在获取到针对目标巡检项目的巡检执行指令时,播放设定动画以缓冲等待离线巡检结果返回。Since network security inspections are performed asynchronously and offline, when the sub-application in the requester's client receives the inspection execution instruction for the target inspection item, it plays a setting animation to buffer and wait for the offline inspection results to return.
申请方客户端中的子应用程序会调用小程序云存储提前上传的设定动画对应的URL(Uniform Resource Locator,统一资源定位符)在巡检提交界面上播放设定动画以等待后台巡检结果返回。如图7所示,申请方客户端中的子应用程序在获取到针对目标巡检项目的巡检执行指令时,在巡检提交界面700中播放设定动画710。The sub-application in the applicant's client calls the URL (Uniform Resource Locator) corresponding to the pre-uploaded setting animation in the mini-program cloud storage to play the setting animation on the inspection submission interface while waiting for the background inspection results to be returned. As shown in Figure 7, when the sub-application in the applicant's client receives the inspection execution instruction for the target inspection project, it plays the setting animation 710 in the inspection submission interface 700.
需要说明的是,步骤605和步骤603可以同时执行;也可以先执行步骤605,再执行步骤603,本申请实施例对此不作限定。It should be noted that steps 605 and 603 can be executed simultaneously; or steps 605 can be executed first, followed by steps 603. This application embodiment does not limit this.
步骤606,在设定动画播放完成之后,申请方客户端中的子应用程序向服务器发送查询请求。Step 606: After the animation playback is complete, the sub-application in the applicant's client sends a query request to the server.
在本申请实施例中,查询请求用于请求查询目标巡检项目的至少一个历史巡检记录。In this embodiment of the application, the query request is used to request at least one historical inspection record of the target inspection item.
相应地,服务器接收来自于申请方客户端中的子应用程序的查询请求。Accordingly, the server receives query requests from sub-applications in the requester's client.
步骤607,服务器向云平台中的云数据库转发查询请求。Step 607: The server forwards the query request to the cloud database in the cloud platform.
在可能的实现方式中,查询请求中包括目标巡检项目的标识,服务器接收到查询请求后,向云平台转发该查询请求,以使得云平台中的云数据库根据该目标巡检项目的标识确定目标巡检项目的至少一个历史巡检记录,并将该目标巡检项目的至少一个历史巡检记录发送给服务器。云数据库中存储有巡检项目的标识与该巡检项目的历史巡检记录之间的对应关系。需要说明的是,服务器向云平台发送的查询请求可以与服务器接收到的查询请求相同,也可以不同。In one possible implementation, the query request includes an identifier for the target inspection item. Upon receiving the query request, the server forwards it to the cloud platform. This allows the cloud database on the platform to determine at least one historical inspection record for the target inspection item based on its identifier and send this record to the server. The cloud database stores the mapping between the inspection item identifier and its historical inspection records. It should be noted that the query request sent by the server to the cloud platform can be the same as or different from the query request received by the server.
步骤608,服务器接收来自于云数据库的目标巡检项目的至少一个历史巡检记录。Step 608: The server receives at least one historical inspection record of the target inspection project from the cloud database.
步骤609,服务器向申请方客户端中的子应用程序发送目标巡检项目的至少一个历史巡检记录。Step 609: The server sends at least one historical inspection record of the target inspection item to the sub-application in the applicant's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的至少一个历史巡检记录。Accordingly, the sub-application in the applicant's client receives at least one historical inspection record of the target inspection item from the server.
在可能的实现方式中,设定动画的播放时长与云平台获取巡检结果的时长一致,如云平台获取到巡检结果后,云平台主动将巡检结果发送给服务器,以使得服务器将巡检结果发送给子应用程序,当子应用程序获取到巡检结果后,子应用程序即可停止播放设定动画。In one possible implementation, the playback duration of the animation is set to be consistent with the duration for which the cloud platform obtains the inspection results. For example, after the cloud platform obtains the inspection results, it actively sends the inspection results to the server, so that the server sends the inspection results to the sub-application. Once the sub-application obtains the inspection results, it can stop playing the set animation.
步骤610,申请方客户端中的子应用程序显示结果查询界面。Step 610: The sub-application in the applicant's client displays the result query interface.
在本申请实施例中,结果查询界面中包括目标巡检项目的至少一个历史巡检记录的选项。In this embodiment of the application, the result query interface includes an option for at least one historical inspection record of the target inspection item.
当巡检提交界面完成设定动画的播放后,子应用程序会自动跳转到结果查询界面。此时,子应用程序会调用接口根据用户标识和项目标识两个字段来通知服务器查询云数据库psg_attack_record集合相关信息。由于子应用程序规定每次拉取云数据库集信息不能超过20条记录,因此为了加速数据库信息遍历拉取,服务器会根据子应用程序传递过来的项目标识先对云数据库psg_attack_record集合作巡检时间戳倒序排序(即按巡检最新执行时间排序),如图8所示,其示出了一种结果查询界面的示意图,该结果查询界面800按照巡检时间戳倒序显示历史巡检记录的选项。After the inspection submission interface completes the animation playback, the sub-application will automatically redirect to the result query interface. At this time, the sub-application will call the interface to notify the server to query relevant information of the cloud database psg_attack_record collection based on the user identifier and project identifier fields. Since the sub-application stipulates that no more than 20 records of cloud database collection information can be retrieved at a time, in order to speed up the traversal and retrieval of database information, the server will first sort the cloud database psg_attack_record collection in reverse order of inspection timestamp (i.e., sorted by the latest inspection execution time) according to the project identifier passed by the sub-application, as shown in Figure 8, which illustrates a schematic diagram of a result query interface. This result query interface 800 has the option to display historical inspection records in reverse order of inspection timestamp.
步骤611,申请方客户端中的子应用程序接收针对目标历史巡检记录的选项的查看指令。Step 611: The sub-application in the applicant's client receives a viewing instruction for the options of the target historical inspection records.
目标历史巡检记录是上述至少一个历史巡检记录中的一个。在本申请实施例中,目标历史巡检记录是与巡检结果对应的历史巡检记录。The target historical inspection record is one of the at least one historical inspection record mentioned above. In this embodiment, the target historical inspection record is the historical inspection record corresponding to the inspection result.
步骤612,申请方客户端中的子应用程序显示报告展示界面。Step 612: The sub-application in the applicant's client displays the report display interface.
服务器根据用户标识、项目标识、巡检时间戳对云数据库psg_attack_record集合作精准匹配查询获取,获取的JSON格式结果集包括以下信息:测试用例对应的中文名称、测试用例对应的安全威胁等级、测试用例对应的类型总量、每个测试用例对应的攻击测试请求数量、每个测试用例对应的阻断成功率、目标网络地址、巡检时间戳等信息。子应用程序拉取到服务器返回的JSON格式结果集后,会拆分成两个界面进行展示:一个是结果查询界面,一个是报告展示界面。其中,结果查询界面会拉取本地缓存记录获取项目名称、项目简称、项目创建时间等信息作罗列展示,同时会根据服务器返回的JSON格式结果集中的巡检时间戳作倒序排序展示,历史巡检记录主要展示字段包括以下至少一项:目标靶机(即目标网络地址)、巡检时间、巡检测试用例巡检状态等。当巡检测试用例巡检状态处于“已完成”时,申请方可点击对应批次的历史巡检记录的选项,以进一步跳转到该批次的报告展示界面进行查看。而在报告展示界面中,子应用程序会读取本地缓存记录获取项目名称、项目简称等信息,然后从服务器返回的JSON结果集中获取目标靶机(即目标网络地址)、巡检时间、整体阻断成功率、安全系统运营状态、每个测试用例对应的阻断成功率、每个测试用例对应的攻击测试请求数量、每个测试用例对应的安全威胁等级等信息作柱状图、饼图等可视化结果展示。The server uses user identifier, project identifier, and inspection timestamp to precisely match and query the psg_attack_record collection in the cloud database. The obtained JSON format result set includes the following information: the Chinese name of the test case, the security threat level of the test case, the total number of test case types, the number of attack test requests for each test case, the blocking success rate for each test case, the target network address, and the inspection timestamp. After the sub-application retrieves the JSON format result set returned by the server, it will display it in two interfaces: a result query interface and a report display interface. The result query interface will retrieve local cache records to obtain and display information such as project name, project abbreviation, and project creation time. It will also sort the results in descending order based on the inspection timestamp in the JSON format result set returned by the server. The historical inspection records mainly display fields including at least one of the following: target machine (i.e., target network address), inspection time, and inspection status of the inspection trial case. When the inspection status of the inspection trial case is "completed," the applicant can click the option of the historical inspection record for the corresponding batch to further jump to the report display interface for that batch. In the report display interface, the sub-application reads local cache records to obtain information such as project name and project abbreviation. Then, it retrieves information such as target target machine (i.e. target network address), inspection time, overall blocking success rate, security system operation status, blocking success rate for each test case, number of attack test requests for each test case, and security threat level for each test case from the JSON result set returned by the server and displays the results in bar charts, pie charts, and other visualizations.
步骤613,申请方客户端中的子应用程序在报告展示界面中显示巡检结果对应的巡检报告。Step 613: The sub-application in the applicant's client displays the inspection report corresponding to the inspection results in the report display interface.
如图9所示,申请方在结果查询界面910中点击与巡检时间为2020-06-1416:26:48的历史巡检记录的选项对应的“已完成”按钮911触发针对该巡检时间为2020-06-14 16:26:48的历史巡检记录的选项的查看指令,然后子应用程序显示报告展示界面920,该报告展示界面920中显示有与该巡检时间为2020-06-14 16:26:48的历史巡检记录的巡检结果对应的巡检报告。可选地,巡检报告中包括项目名称、目标网络地址、巡检时间、安全总览(恶意请求整体阻断成功率)、各个测试用例对应的阻断成功率、各个测试用例对应的请求数量分布、各个测试用例对应的安全威胁等级。As shown in Figure 9, the applicant clicks the "Completed" button 911 corresponding to the option for the historical inspection record with an inspection time of 2020-06-14 16:26:48 in the result query interface 910. This triggers a viewing command for the option of the historical inspection record with an inspection time of 2020-06-14 16:26:48. Then, the sub-application displays a report display interface 920, which shows the inspection report corresponding to the inspection results of the historical inspection record with an inspection time of 2020-06-14 16:26:48. Optionally, the inspection report includes the project name, target network address, inspection time, security overview (overall success rate of blocking malicious requests), the success rate of blocking for each test case, the distribution of the number of requests for each test case, and the security threat level for each test case.
在实际应用测试效果中,使用本申请提供的技术方案后,安全系统远程巡检可缩短到分钟级别完成并可提供可视化的巡检报告输出。In practical application testing, the technical solution provided in this application shows that remote inspection of the security system can be completed in minutes and can provide a visual inspection report output.
在示意性实施例中,如图10所示,其示出了本申请另一个实施例提供的网络安全巡检方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(1001~1016):In an illustrative embodiment, as shown in FIG10, a flowchart of a network security inspection method provided in another embodiment of this application is illustrated. In this embodiment, the method is described in the implementation environment shown in FIG1. The method may include the following steps (1001-1016):
步骤1001,申请方客户端中的子应用程序显示项目管理界面。Step 1001: The sub-application in the applicant's client displays the project management interface.
项目管理界面中还包括项目创建控件,该项目创建控件用于新建巡检项目。若申请方是第一次登录子应用程序,则项目管理界面中并不显示巡检项目,申请方可以创建巡检项目;若申请方不是第一次登录子应用程序,且申请方创建过巡检项目,则项目管理界面中会显示已创建的巡检项目。The project management interface also includes a project creation control, which is used to create new inspection projects. If the applicant is logging into the sub-application for the first time, the inspection projects will not be displayed in the project management interface, but the applicant can create an inspection project. If the applicant is not logging into the sub-application for the first time and has created an inspection project before, the created inspection projects will be displayed in the project management interface.
申请方登录项目管理界面时,子应用程序会根据用户帐号信息,如申请方的用户标识和用户昵称两个参数来调用后台接口查询读取云数据库psg_project集合该用户名下的巡检项目。如果服务器从psg_project集合中查询无该用户名下的巡检项目,则返回空列表给前端,前端获取到服务器返回的空列表后则提示申请方可点击项目创建控件,如“新建项目”按钮来创建新的巡检项目。当申请方点击项目创建控件后,子应用程序传递给服务器以写入到云数据库psg_project集合中作申请方的用户标识(openid)、用户昵称、用户头像、项目创建时间等个人信息属性新增。When the applicant logs into the project management interface, the sub-application uses user account information, such as the applicant's user ID and nickname, to query the backend interface and retrieve the inspection projects under that user's name from the `psg_project` collection in the cloud database. If the server finds no inspection projects under that user's name in the `psg_project` collection, it returns an empty list to the frontend. Upon receiving this empty list, the frontend prompts the applicant to click a project creation control, such as the "Create Project" button, to create a new inspection project. When the applicant clicks the project creation control, the sub-application passes the information to the server to add personal information attributes such as the applicant's user ID (openid), nickname, avatar, and project creation time to the `psg_project` collection in the cloud database.
如果后台从psg_project集合中查询到该用户名下的项目,则组合返回JSON格式的项目列表信息给子应用程序,组合的项目列表信息包括以下至少一项:项目标识、项目名称、项目简称、项目创建时间、项目最后有效期、“项目申请状态”字段值、“项目有效期状态”字段值等信息。子应用程序会根据“项目申请状态”字段值对“发起巡检”按钮作文字展示和可用性区分,其中,“项目申请状态”字段值为0代表新建巡检项目待审批、“项目申请状态”字段值为1代表巡检项目已审批通过、“项目申请状态”字段值为2代表巡检项目已审批拒绝、“项目申请状态”字段值为3代表巡检项目已续期待审批。子应用程序根据“项目有效期状态”字段值对权限有效期字段作文字展示,“项目有效期状态”字段值为0代表有效期已过期,此时权限有效期字段显示为“需续期”;“项目有效期状态”字段值为1代表处于有效期,此时权限有效期字段显示为巡检项目最后的有效期时间。If the backend retrieves projects under the username from the `psg_project` collection, it returns a list of projects in JSON format to the sub-application. This list includes at least one of the following: project identifier, project name, project abbreviation, project creation time, project expiration date, "Project Application Status" field value, and "Project Validity Status" field value. The sub-application will adjust the text display and availability of the "Initiate Inspection" button based on the "Project Application Status" field value. A value of 0 indicates a newly created inspection project awaiting approval; 1 indicates the inspection project has been approved; 2 indicates the inspection project has been rejected; and 3 indicates the inspection project has been renewed and awaits approval. The sub-application will also adjust the permission validity period field based on the "Project Validity Status" field value. A value of 0 indicates the validity period has expired, and the permission validity period field will display "Renewal Required"; a value of 1 indicates the validity period is currently active, and the permission validity period field will display the final expiration date of the inspection project.
步骤1002,申请方客户端中的子应用程序接收针对项目创建控件的项目创建指令,显示项目创建界面。Step 1002: The sub-application in the applicant's client receives the project creation instruction for the project creation control and displays the project creation interface.
如图11所示,其示出了一种项目管理界面的示意图,该项目管理界面1110中包括项目创建控件1111。申请方可以点击该项目创建控件1111,触发向子应用程序发送项目创建指令,然后子应用程序会显示项目创建界面1120。Figure 11 illustrates a schematic diagram of a project management interface 1110, which includes a project creation control 1111. The applicant can click the project creation control 1111 to trigger a project creation command to be sent to a sub-application, which then displays the project creation interface 1120.
步骤1003,申请方客户端中的子应用程序获取在项目创建界面中提交的新巡检项目的项目信息。Step 1003: The sub-application in the applicant's client obtains the project information of the new inspection project submitted in the project creation interface.
在可能的实现方式中,项目信息包括以下至少一项:项目名称、项目权限有效期、申请角色、申请原因、项目简称。项目创建界面1120中包括项目信息的输入框1121,申请方可以在该输入框1121中输入项目信息。项目创建界面1120中显示有项目提交控件1122,该项目提交控件1122用于提交新巡检项目的项目信息,当用户输入完项目信息后,可以点击该项目提交控件1122,以使得子应用程序获取上述新巡检项目的项目信息。In possible implementations, project information includes at least one of the following: project name, project permission validity period, applicant role, reason for application, and project abbreviation. The project creation interface 1120 includes an input box 1121 for project information, where the applicant can enter project information. The project creation interface 1120 also displays a project submission control 1122, which is used to submit project information for a new inspection project. After the user enters the project information, they can click the project submission control 1122 to allow the sub-application to obtain the project information for the new inspection project.
申请方客户端中的子应用程序获取到项目信息后,项目管理界面1110中会显示申请方刚刚创建的巡检项目的选项,且与该巡检项目的选项对应的按钮1112的显示状态为“待审批”。After the sub-application in the applicant's client obtains the project information, the project management interface 1110 will display the option for the inspection project that the applicant just created, and the button 1112 corresponding to the option of the inspection project will be displayed as "Pending Approval".
步骤1004,申请方客户端中的子应用程序向服务器发送项目审批请求。Step 1004: The sub-application in the applicant's client sends a project approval request to the server.
在本申请实施例中,项目审批请求用于请求对新巡检项目进行审批,项目审批请求中包括新巡检项目的项目信息。In this embodiment of the application, the project approval request is used to request approval for a new inspection project, and the project approval request includes the project information of the new inspection project.
申请方提交完项目信息后,需要审批方对该新巡检项目的项目信息进行审批。当子应用程序获取到上述项目信息后,向服务器发送项目审批请求。示例性地,当申请方点击项目提交控件1122后,子应用程序获取到上述项目信息,向服务器发送项目审批请求。After the applicant submits the project information, the approver needs to review and approve the project information for the new inspection project. Once the sub-application obtains the project information, it sends a project approval request to the server. For example, when the applicant clicks the project submission control 1122, the sub-application obtains the project information and sends a project approval request to the server.
相应地,服务器接收申请方客户端中的子应用程序发送的项目审批请求,项目审批请求用于请求对新巡检项目进行审批,项目审批请求中包括新巡检项目的项目信息。Accordingly, the server receives a project approval request sent by a sub-application in the applicant's client. The project approval request is used to request approval for a new inspection project and includes the project information of the new inspection project.
步骤1005,服务器向审批方客户端中的子应用程序发送项目审批信息。Step 1005: The server sends project approval information to the sub-application in the approver's client.
在本申请实施例中,项目审批信息中包括项目信息。In this embodiment of the application, the project approval information includes project information.
在可能的实现方式中,项目审批请求中还包括申请方的用户信息、新巡检项目的项目创建时间戳。服务器获取到该项目审批信息后,会将该项目审批信息发送给云平台,以使得云平台根据项目信息、申请方的用户信息和项目创建时间戳,生成新巡检项目的标识,并将该新巡检项目的标识、该巡检项目的项目信息与该申请方的用户信息对应存储在云数据库中。In one possible implementation, the project approval request also includes the applicant's user information and the project creation timestamp of the new inspection project. After the server obtains the project approval information, it sends the project approval information to the cloud platform, so that the cloud platform can generate an identifier for the new inspection project based on the project information, the applicant's user information, and the project creation timestamp, and store the identifier of the new inspection project, the project information of the inspection project, and the applicant's user information in the cloud database.
相应地,审批方客户端中的子应用程序接收来自服务器的项目审批信息。Accordingly, the sub-application in the approver's client receives project approval information from the server.
步骤1006,审批方客户端中的子应用程序在项目审批界面中接收对项目审批信息的审批操作。Step 1006: The sub-application in the approver's client receives the approval operation for the project approval information in the project approval interface.
审批方进入审批方客户端中的子应用程序显示的项目审批界面,对项目审批信息进行审批,审批方客户端中的子应用程序接收审批方对项目审批信息的审批操作,该审批操作包括审批通过操作或审批驳回操作。The approver enters the project approval interface displayed in the sub-application of the approver's client to approve the project approval information. The sub-application of the approver's client receives the approver's approval operation on the project approval information, which includes approval or rejection.
可选地,审批方客户端中的子应用程序在项目管理界面拥有两个入口:“我的项目”和“管理中心”。子应用程序判断当前为审批方权限用户,则通知服务器从云数据库psg_project集合中查询子应用程序所有用户名下的项目信息,并组合成JSON格式的结果集返回给项目管理界面作项目列表展示,JSON格式的结果集主要字段包括所有的项目标识、项目名称、项目简称、项目创建时间、项目最后有效期、“项目申请状态”字段值、“项目有效期状态”字段值等信息。Optionally, the sub-application in the approver's client has two entry points in the project management interface: "My Projects" and "Management Center". If the sub-application determines that the current user has approver privileges, it instructs the server to query the project information under all usernames in the cloud database psg_project collection, and combines this information into a JSON-formatted result set, which is then returned to the project management interface as a project list. The main fields of the JSON-formatted result set include all project identifiers, project names, project abbreviations, project creation time, project last validity period, the value of the "Project Application Status" field, and the value of the "Project Validity Status" field.
如图12所示,当审批方登录子应用程序并进入项目管理界面后,前端会罗列展示4个tab页面标签:“待审批”、“续期请求”、“已通过”、“已驳回”,其中默认展示界面为“待审批”界面1210,前端会调用query_user_project函数向服务器请求遍历查询云数据库中psg_project集合里面“项目申请状态”字段值为0(代表新建项目待审批)的项目列表结果,服务器将查询到的项目列表结果组合成JSON结果集返回给前端以在“待审批”界面1210罗列展示项目创建时间、用户头像、用户昵称、项目名称等信息。同理,当审批方切换到其他三个tab页面标题时,前端会调用query_user_project函数向后台请求遍历查询云数据库中psg_project集合里面项目申请状态字段值分别为3(代表项目续期待审批)、1(代表项目已审批通过)、2(代表项目已审批拒绝)的项目结果列表,服务器将查询到的对应项目列表结果组合成JSON结果集返回给子应用程序以在对应页面,如“续期请求”界面1220、“已通过”界面1230、“已驳回”界面1240罗列展示项目创建时间、用户头像、用户昵称、项目名称等信息。As shown in Figure 12, when the approver logs into the sub-application and enters the project management interface, the front end will display four tabs: "Pending Approval", "Renewal Request", "Approved", and "Rejected". The default display interface is the "Pending Approval" interface 1210. The front end will call the query_user_project function to request the server to traverse and query the list of projects in the psg_project collection in the cloud database whose "Project Application Status" field value is 0 (representing a newly created project pending approval). The server will combine the queried project list results into a JSON result set and return it to the front end to display information such as project creation time, user avatar, user nickname, and project name on the "Pending Approval" interface 1210. Similarly, when the approver switches to the other three tab titles, the front end calls the query_user_project function to request the back end to traverse and query the project application status field of the psg_project collection in the cloud database. The project result list has values of 3 (representing that the project is pending approval), 1 (representing that the project has been approved), and 2 (representing that the project has been rejected). The server combines the corresponding project list results into a JSON result set and returns it to the sub-application to list and display information such as project creation time, user avatar, user nickname, and project name on the corresponding pages, such as the "Renewal Request" page 1220, the "Approved" page 1230, and the "Rejected" page 1240.
如图13所示,在“待审批”界面1310中,审批方点击某一巡检项目时,会触发前端弹窗1320展示该项目名称、项目简称、申请角色、有效期、申请原因等项目信息让审批方执行审批通过操作或审批驳回操作。当审批方点击弹窗1320中的“审批通过”按钮1321时,审批方客户端中的子应用程序接收到审批通过操作,子应用程序会调用后台admin_project_applypass函数更新云数据库psg_project集合里面“项目申请状态”字段值为1(代表已审批通过)。当审批方点击弹窗1320中的“驳回申请”按钮时,审批方客户端中的子应用程序接收到审批驳回操作,子应用程序会调用后台admin_project_applyreject函数更新云数据库psg_project集合里面“项目申请状态”字段值为2(代表已审批拒绝),并调用push_user_apply函数给申请方推送审批结果通知。As shown in Figure 13, in the "Pending Approval" interface 1310, when the approver clicks on a specific inspection item, a front-end pop-up window 1320 is triggered, displaying project information such as the project name, project abbreviation, applicant role, validity period, and application reason, allowing the approver to perform either approval or rejection. When the approver clicks the "Approved" button 1321 in the pop-up window 1320, the sub-application in the approver's client receives the approval operation. The sub-application calls the backend function `admin_project_applypass` to update the "Project Application Status" field in the `psg_project` collection of the cloud database to 1 (representing approval). When the approver clicks the "Reject Application" button in the pop-up window 1320, the sub-application in the approver's client receives the rejection operation. The sub-application calls the backend function `admin_project_applyreject` to update the "Project Application Status" field in the `psg_project` collection of the cloud database to 2 (representing rejection), and calls the `push_user_apply` function to push the approval result notification to the applicant.
步骤1007,审批方客户端中的子应用程序根据审批操作,生成项目审批结果。Step 1007: The sub-application in the approver's client generates the project approval result based on the approval operation.
当子应用程序接收到审批通过操作时,生成的项目审批结果为项目审批通过结果;当子应用程序接收到审批驳回操作时,生成的项目审批结果为项目审批驳回结果。When a sub-application receives an approval request, the generated project approval result is "Project Approval Approval Result"; when a sub-application receives an approval rejection request, the generated project approval result is "Project Approval Rejection Result".
步骤1008,审批方客户端中的子应用程序将项目审批结果发送给服务器。Step 1008: The sub-application in the approver's client sends the project approval result to the server.
相应地,服务器接收来自于审批方客户端中的子应用程序基于项目信息确定的项目审批结果。Accordingly, the server receives the project approval result determined by the sub-application in the approver's client based on the project information.
步骤1009,服务器将项目审批结果发送给申请方客户端中的子应用程序。Step 1009: The server sends the project approval result to the sub-application in the applicant's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的新巡检项目的项目审批结果。Accordingly, the sub-application in the applicant's client receives the project approval results for the new inspection project from the server.
步骤1010,申请方客户端中的子应用程序在项目管理界面中显示项目审批结果。Step 1010: The sub-application in the applicant's client displays the project approval result in the project management interface.
如图14所示,若项目审批结果为项目审批通过结果,则项目管理界面1400中与新巡检项目的选项对应的目标按钮1410的显示状态从“待审批”变为了“发起巡检”。若项目审批结果为项目审批驳回结果,则项目管理界面1400中与新巡检项目的选项对应的目标按钮1410的显示状态从“待审批”变为了“已驳回”。As shown in Figure 14, if the project approval result is "Project Approved", the display status of the target button 1410 corresponding to the option for the new inspection project in the project management interface 1400 changes from "Pending Approval" to "Initiate Inspection". If the project approval result is "Project Approval Rejected", the display status of the target button 1410 corresponding to the option for the new inspection project in the project management interface 1400 changes from "Pending Approval" to "Rejected".
在可能的实现方式中,申请方客户端中的子应用程序接收来自于服务器的新巡检项目的项目审批结果之后,还执行下述步骤:获取项目审批结果中包含的各个字段,字段包括以下至少一项:项目审批时间、项目审批人员、项目审核结果;将各个字段填充至项目审批结果通知消息模板中,生成项目审批结果通知消息;在母应用程序中显示项目审批结果通知消息。In a possible implementation, after the sub-application in the applicant client receives the project approval result of the new inspection project from the server, it also performs the following steps: obtains each field contained in the project approval result, the field including at least one of the following: project approval time, project approver, and project review result; fills each field into the project approval result notification message template to generate a project approval result notification message; and displays the project approval result notification message in the parent application.
可选地,服务器申请了两个通知消息模板作审批申请通知和审批结果通知。项目审批申请通知消息模板主要包括四个字段:项目名称、用户昵称、申请原因、申请时间。项目审批结果通知消息模板主要包括五个字段:项目名称、申请时间、处理时间、审核人员和审核结果。示例性地,图15示出了一种项目审批结果通知消息的示意图,该项目审批结果通知消息1500包括了如下五个字段:项目名称、申请时间、处理时间、审核人员和审核结果;图16示出了一种项目审批申请通知消息的示意图,该项目审批申请通知消息1600中包括了如下四个字段:项目名称、用户昵称、申请原因、申请时间。Optionally, the server requests two notification message templates for project approval application notification and approval result notification. The project approval application notification message template mainly includes four fields: project name, user nickname, application reason, and application time. The project approval result notification message template mainly includes five fields: project name, application time, processing time, reviewer, and review result. For example, Figure 15 shows a schematic diagram of a project approval result notification message, where project approval result notification message 1500 includes the following five fields: project name, application time, processing time, reviewer, and review result; Figure 16 shows a schematic diagram of a project approval application notification message, where project approval application notification message 1600 includes the following four fields: project name, user nickname, application reason, and application time.
当申请方点击“新建项目”提交按钮或“待续期”提交按钮时,子应用程序会通知后台调用小程序API接口wx.requestSubscribeMessage让申请方授权两个通知消息模板推送。若申请方点击允许消息推送授权后,则在审批方审批通过后可以接收到项目审批结果通知消息,否则将无法接收到项目审批结果通知消息。When the applicant clicks the "New Project" or "Pending Renewal" submission button, the sub-application will notify the backend to call the WeChat Mini Program API interface wx.requestSubscribeMessage to authorize the push of two notification message templates. If the applicant clicks to allow push notification authorization, they will receive the project approval result notification message after the approver approves the application; otherwise, they will not receive the project approval result notification message.
审批方与申请方之间的审批交互采用通知消息模板订阅的方式,可以有效减少短信下发成本。The approval process between the approver and the applicant uses a notification message template subscription method, which can effectively reduce the cost of sending SMS messages.
步骤1011,申请方客户端中的子应用程序获取针对至少一个巡检项目中的目标巡检项目的巡检执行指令。Step 1011: The sub-application in the applicant client obtains the inspection execution instruction for the target inspection item in at least one inspection item.
步骤1012,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 1012: The sub-application in the applicant client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。In this embodiment of the application, the inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
相应地,服务器接收来自于申请方客户端中的子应用程序的巡检执行请求,子应用程序为依赖于母应用程序运行的程序,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives inspection execution requests from sub-applications in the requesting client. Sub-applications are programs that depend on the parent application to run. The inspection execution requests are used to request the execution of network security inspections related to the target inspection item.
步骤1013,服务器向云平台发送攻击测试请求。Step 1013: The server sends an attack test request to the cloud platform.
在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspection on the target network address.
步骤1014,服务器接收来自于云平台的目标巡检项目的巡检结果。Step 1014: The server receives the inspection results of the target inspection project from the cloud platform.
步骤1015,服务器向申请方客户端中的子应用程序发送巡检结果。Step 1015: The server sends the inspection results to the sub-application in the requester's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的巡检结果。Accordingly, the sub-application in the applicant's client receives the inspection results of the target inspection items from the server.
步骤1016,申请方客户端中的子应用程序显示巡检结果。Step 1016: The sub-application in the applicant's client displays the inspection results.
有关步骤1011至1016的介绍说明可参见上文实施例,此处不再赘述。For a description of steps 1011 to 1016, please refer to the above embodiments; they will not be repeated here.
需要说明的是,步骤1002至1010可以在步骤1011之后执行,也即申请方可以在本次网络安全巡检执行完后,才新建巡检项目。It should be noted that steps 1002 to 1010 can be executed after step 1011, meaning that the applicant can create a new inspection project only after this network security inspection has been completed.
综上所述,本申请实施例提供的技术方案中,通过审批方对申请方创建的巡检项目进行审批,有助于巡检项目的统一管理,避免了恶意创建巡检项目的情况。In summary, the technical solution provided in this application embodiment, which allows the approver to approve the inspection projects created by the applicant, helps to unify the management of inspection projects and avoids the situation of maliciously creating inspection projects.
在示意性实施例中,如图17所示,其示出了本申请另一个实施例提供的网络安全巡检方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(1701~1715):In an illustrative embodiment, as shown in FIG17, a flowchart of a network security inspection method provided in another embodiment of this application is illustrated. In this embodiment, the method is described in the implementation environment shown in FIG1. The method may include the following steps (1701-1715):
步骤1701,申请方客户端中的子应用程序显示项目管理界面。Step 1701: The sub-application in the applicant's client displays the project management interface.
步骤1702,申请方客户端中的子应用程序获取针对目标巡检项目的选项的项目续期指令。Step 1702: The sub-application in the applicant client obtains the project renewal instruction for the options of the target inspection project.
为了避免网络安全巡检服务滥用,每个巡检项目均设计了有效期限时长限制,当已审批通过的巡检项目的有效期到期后,申请方可在项目管理界面中点击项目续期控件来申请项目续期使用。To prevent the abuse of network security inspection services, each inspection project has a validity period limit. When the validity period of an approved inspection project expires, the applicant can click the project renewal control in the project management interface to apply for project renewal.
如图18所示,项目管理界面1800中显示有至少一个巡检项目的选项,项目名称为“xx银行”的巡检项目1810的有效期已到期,申请方可通过点击与该巡检项目的选项1810对应的项目续期控件1820触发项目续期指令。As shown in Figure 18, the project management interface 1800 displays at least one inspection project option. The validity period of inspection project 1810 with the project name "xx Bank" has expired. The applicant can trigger the project renewal instruction by clicking the project renewal control 1820 corresponding to the inspection project option 1810.
步骤1703,申请方客户端中的子应用程序向服务器发送项目续期请求。Step 1703: The sub-application in the applicant's client sends a project renewal request to the server.
在本申请实施例中,项目续期请求用于请求延长目标巡检项目的有效期。在一个示例中,申请方不可选择项目续期时间,项目续期时间与该目标巡检项目创建时选择的有效期时间一致;在另一个示例中,申请方可选择项目续期时间,当申请方客户端中的子应用程序获取到项目续期指令时,显示项目续期时间选择列表,申请方可在该项目续期时间选择列表中自主选择项目续期时间,此时,项目续期请求中包括项目续期时间。In this embodiment, the project renewal request is used to request an extension of the validity period of the target inspection project. In one example, the applicant cannot select the project renewal time, and the project renewal time is consistent with the validity period selected when the target inspection project was created. In another example, the applicant can select the project renewal time. When the sub-application in the applicant's client receives the project renewal instruction, it displays a project renewal time selection list, and the applicant can independently select the project renewal time from the list. In this case, the project renewal request includes the project renewal time.
相应地,服务器接收来自于申请方客户端中的子应用程序的项目续期请求。Accordingly, the server receives project renewal requests from sub-applications in the requester's client.
步骤1704,服务器向审批方客户端中的子应用程序发送项目续期信息。Step 1704: The server sends project renewal information to the sub-application in the approver's client.
在本申请实施例中,该项目续期信息中包括项目信息。In this embodiment of the application, the project renewal information includes project information.
相应地,审批方客户端中的子应用程序接收来自服务器的项目续期信息。Accordingly, the sub-application in the approver's client receives project renewal information from the server.
步骤1705,审批方客户端中的子应用程序在项目审批界面中接收对项目续期信息的续期审批操作。Step 1705: The sub-application in the approver's client receives the renewal approval operation for the project renewal information in the project approval interface.
步骤1706,审批方客户端中的子应用程序根据续期审批操作,生成项目续期结果。Step 1706: The sub-application in the approver's client generates the project renewal result based on the renewal approval operation.
步骤1707,审批方客户端中的子应用程序将项目续期结果发送给服务器。Step 1707: The sub-application in the approver's client sends the project renewal result to the server.
步骤1708,服务器向申请方客户端中的子应用程序发送项目续期结果。Step 1708: The server sends the project renewal result to the sub-application in the applicant's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的项目续期结果。Accordingly, the sub-application in the applicant's client receives the project renewal results of the target inspection project from the server.
步骤1709,申请方客户端中的子应用程序在项目管理界面中显示项目续期结果。Step 1709: The sub-application in the applicant's client displays the project renewal result in the project management interface.
如图18所示,若项目续期结果为项目续期通过结果,则项目续期控件1820的显示状态从“申请续期”变为了“发起巡检”;若项目续期结果为项目续期驳回结果,则项目续期控件1820的显示状态仍为“申请续期”。As shown in Figure 18, if the project renewal result is "Project renewal approved", the display status of the project renewal control 1820 changes from "Apply for renewal" to "Initiate inspection"; if the project renewal result is "Project renewal rejected", the display status of the project renewal control 1820 remains "Apply for renewal".
在可能的实现方式中,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的项目续期结果之后,还执行下述步骤:获取项目续期结果中包含的各个字段,上述字段包括以下至少一项:项目续期审批时间、项目续期审批人员、项目续期结果;将各个字段填充至项目审批结果通知消息模板中,生成项目续期结果通知消息;在母应用程序中显示项目续期结果通知消息。In a possible implementation, after the sub-application in the applicant's client receives the project renewal result of the target inspection project from the server, it also performs the following steps: obtains each field contained in the project renewal result, the above fields including at least one of the following: project renewal approval time, project renewal approver, and project renewal result; fills each field into the project approval result notification message template to generate a project renewal result notification message; and displays the project renewal result notification message in the parent application.
步骤1710,申请方客户端中的子应用程序获取针对目标巡检项目的巡检执行指令。Step 1710: The sub-application in the applicant's client obtains the inspection execution instruction for the target inspection item.
当目标巡检项目完成续期后,目标巡检项目的项目有效期状态为有效,此时子应用程序可以获取针对目标巡检项目的巡检执行指令。Once the target inspection project has been renewed, its validity period becomes valid, at which point the sub-application can obtain the inspection execution instructions for the target inspection project.
步骤1711,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 1711: The sub-application in the applicant client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。In this embodiment of the application, the inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
相应地,服务器接收申请方客户端中的子应用程序发送的巡检执行请求,子应用程序为依赖于母应用程序运行的程序,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives the inspection execution request sent by the sub-application in the requesting client. The sub-application is a program that depends on the parent application to run. The inspection execution request is used to request the execution of network security inspections related to the target inspection item.
步骤1712,服务器向云平台发送攻击测试请求。Step 1712: The server sends an attack test request to the cloud platform.
在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspection on the target network address.
步骤1713,服务器接收来自于云平台的目标巡检项目的巡检结果。Step 1713: The server receives the inspection results of the target inspection project from the cloud platform.
步骤1714,服务器向申请方客户端中的子应用程序发送巡检结果。Step 1714: The server sends the inspection results to the sub-application in the requester's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的巡检结果。Accordingly, the sub-application in the applicant's client receives the inspection results of the target inspection items from the server.
步骤1715,申请方客户端中的子应用程序在子应用程序中显示巡检结果。Step 1715: The sub-application in the applicant's client displays the inspection results.
有关步骤1710至1715的介绍说明可参见上文实施例,此处不再赘述。For a description of steps 1710 to 1715, please refer to the above embodiments; they will not be repeated here.
需要说明的是,步骤1702至1709可以在步骤1710之后执行,也即目标巡检项目的有效期可能在执行完本次网络安全巡检后才过期,然后申请方在目标巡检项目有续期需求的时候触发项目续期指令。It should be noted that steps 1702 to 1709 can be executed after step 1710. That is, the validity period of the target inspection project may expire only after this network security inspection is completed. Then, the applicant can trigger the project renewal instruction when the target inspection project has a renewal requirement.
在可能的实现方式中,可以不作有效期续期、审批方授权等机制设计,只要有登录认证信息作个人信息溯源即可。In possible implementations, mechanisms such as validity period renewal and approval authority authorization can be omitted; as long as there is login authentication information for personal information traceability, it is sufficient.
在示意性实施例中,如图19所示,其示出了本申请另一个实施例提供的网络安全巡检方法的流程图。在本实施例中,以该方法应用于图1所示的实施环境中进行介绍说明。该方法可以包括如下几个步骤(1901~1909):In an illustrative embodiment, as shown in FIG19, a flowchart of a network security inspection method provided in another embodiment of this application is illustrated. In this embodiment, the method is described in the implementation environment shown in FIG1. The method may include the following steps (1901-1909):
步骤1901,申请方客户端中的子应用程序显示子应用程序的首页界面。Step 1901: The sub-application in the applicant's client displays the homepage interface of the sub-application.
申请方可以在母应用程序提供的子应用程序搜索框中搜索本申请实施例提供的子应用程序或扫描子应用程序二维码进入本申请实施例提供的子应用程序的首页界面。The applicant can search for the sub-applications provided in this application embodiment in the sub-application search box provided by the parent application or scan the sub-application QR code to enter the homepage interface of the sub-applications provided in this application embodiment.
在本申请实施例中,首页界面中包括登录控件。如图20所示,首页界面2010中包括登录控件2011。In this embodiment of the application, the homepage interface includes a login control. As shown in Figure 20, the homepage interface 2010 includes a login control 2011.
步骤1902,申请方客户端中的子应用程序接收针对登录控件的确认指令,显示用户登录界面。In step 1902, the sub-application in the applicant's client receives a confirmation instruction for the login control and displays the user login interface.
当子应用程序接收到针对登录控件的确认指令时,子应用程序向服务器发送帐号信息获取请求,该帐号信息获取请求用于请求服务器获取申请方客户端对应的用户帐号信息,该用户帐号信息可以包括以下至少一项:用户昵称、用户头像、用户所在地区、用户性别。服务器获取申请方客户端对应的用户帐号信息,然后向申请方客户端中的子应用程序发送该用户帐号信息。When a sub-application receives a confirmation instruction for the login control, it sends an account information retrieval request to the server. This request asks the server to retrieve the user account information corresponding to the requesting client. This user account information may include at least one of the following: user nickname, user avatar, user's region, and user's gender. The server retrieves the user account information from the requesting client and then sends it to the sub-application within that client.
在本申请实施例中,如图20所示,用户登录界面2020中包括同意控件2021和拒绝控件2022,同意控件2021用于授权子应用程序登录母应用程序对应的用户帐号信息,拒绝控件2022用于拒绝授权子应用程序登录母应用程序对应的用户帐号信息。申请方在首页界面2010中点击登录控件2011,如“x信快捷登录”按钮,触发子应用程序显示用户登录界面2020,该用户登录界面2020中包括同意控件2021和拒绝控件2022。需要说明的是,本申请实施例中的母应用程序为申请方客户端。In this embodiment, as shown in Figure 20, the user login interface 2020 includes an "Agree" control 2021 and a "Reject" control 2022. The "Agree" control 2021 authorizes the sub-application to log in to the user account information corresponding to the parent application, and the "Reject" control 2022 refuses to authorize the sub-application to log in to the user account information corresponding to the parent application. When the applicant clicks the login control 2011 on the homepage interface 2010, such as the "X-mail Quick Login" button, the sub-application is triggered to display the user login interface 2020, which includes the "Agree" control 2021 and the "Reject" control 2022. It should be noted that the parent application in this embodiment is the applicant's client.
步骤1903,响应于接收到对同意控件的确认指令,申请方客户端中的子应用程序在子应用程序中显示项目管理界面。In step 1903, in response to receiving a confirmation instruction for the consent control, the sub-application in the applicant client displays the project management interface within the sub-application.
如图20所示,当申请方在用户登录界面2020中点击同意控件2021时,触发显示项目管理界面2030;当申请方在用户登录界面2020中点击拒绝控件2022时,申请方将无法正常使用子应用程序。As shown in Figure 20, when the applicant clicks the "Agree" control 2021 on the user login interface 2020, the project management interface 2030 is triggered; when the applicant clicks the "Reject" control 2022 on the user login interface 2020, the applicant will be unable to use the sub-application normally.
子应用程序会先判断申请方是否授权登录过该子应用程序,如果子应用程序判断申请方曾经授权登录过,则查询子应用程序本地缓存读取用户帐号信息,该用户帐号信息包括以下至少一项:用户标识、用户昵称、用户头像;如果子应用程序判断申请方是首次登陆子应用程序,则调用云开发模式的云函数login获取申请方的用户标识,调用母应用程序API接口wx.getUserInfo函数获取用户昵称和用户头像等信息并记录写入小程序本地缓存,同时子应用程序会将用户帐号信息写入云数据库psg_user集合作持久化存储和后续接口用户信息校验,申请方新建的巡检项目的项目权限角色默认是普通用户,审批方用户权限的切换在可视化的云开发控制台作云数据库psg_user集合相应的字段值修改。The sub-application first determines whether the applicant has authorized login to the sub-application before. If the sub-application determines that the applicant has previously authorized login, it queries the sub-application's local cache to read the user account information, which includes at least one of the following: user ID, user nickname, and user avatar. If the sub-application determines that the applicant is logging into the sub-application for the first time, it calls the cloud function `login` in cloud development mode to obtain the applicant's user ID, calls the parent application's API interface `wx.getUserInfo` to obtain the user nickname and user avatar, and records and writes them to the mini-program's local cache. At the same time, the sub-application writes the user account information to the cloud database `psg_user` collection for persistent storage and subsequent interface user information verification. The project permission role of the inspection project newly created by the applicant is a regular user by default. Switching the approver's user permissions is done by modifying the corresponding field values of the cloud database `psg_user` collection in the visual cloud development console.
步骤1904,申请方客户端中的子应用程序获取针对至少一个巡检项目中的目标巡检项目的巡检执行指令。Step 1904: The sub-application in the applicant client obtains the inspection execution instruction for the target inspection item in at least one inspection item.
步骤1905,申请方客户端中的子应用程序向服务器发送巡检执行请求。Step 1905: The sub-application in the applicant client sends an inspection execution request to the server.
在本申请实施例中,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。In this embodiment of the application, the inspection execution request is used to request the execution of a network security inspection related to the target inspection item.
相应地,服务器接收申请方客户端中的子应用程序发送的巡检执行请求,子应用程序为依赖于母应用程序运行的程序,巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检。Accordingly, the server receives the inspection execution request sent by the sub-application in the requesting client. The sub-application is a program that depends on the parent application to run. The inspection execution request is used to request the execution of network security inspections related to the target inspection item.
步骤1906,服务器向云平台发送攻击测试请求。Step 1906: The server sends an attack test request to the cloud platform.
在本申请实施例中,攻击测试请求中包括目标巡检项目的巡检参数,巡检参数用于对目标网络地址进行网络安全巡检。In this embodiment of the application, the attack test request includes inspection parameters for the target inspection item, which are used to perform network security inspection on the target network address.
步骤1907,服务器接收来自于云平台的目标巡检项目的巡检结果。Step 1907: The server receives the inspection results of the target inspection project from the cloud platform.
步骤1908,服务器向申请方客户端中的子应用程序发送巡检结果。Step 1908: The server sends the inspection results to the sub-application in the requester's client.
相应地,申请方客户端中的子应用程序接收来自于服务器的目标巡检项目的巡检结果。Accordingly, the sub-application in the applicant's client receives the inspection results of the target inspection items from the server.
步骤1909,申请方客户端中的子应用程序显示巡检结果。Step 1909: The sub-application in the applicant's client displays the inspection results.
有关步骤1904至1909的介绍说明可参见上文实施例,此处不再赘述。For a description of steps 1904 to 1909, please refer to the above embodiments; they will not be repeated here.
本申请实施例借助子应用程序的帐号登录认证体系,可以避免相关技术中使用web网页若安全授权机制设计不严格且暴露在公网任意访问可能导致被黑产利用的风险。子应用程序具备严格的登录态安全认证功能,本申请实施例借助子应用程序载体来实现用户登录认证、用户个人项目管理、项目授权审批借助母应用程序推送通知触达申请方和审批方,提升了安全系统远程巡检的效率。This application embodiment utilizes a sub-application's account login authentication system to avoid the risk of exploitation by malicious actors if the security authorization mechanism of a web page is poorly designed and exposed to arbitrary access on the public network, as seen in related technologies. The sub-application possesses strict login-state security authentication capabilities. This application embodiment leverages the sub-application as a carrier to implement user login authentication, user personal project management, and project authorization approval, with push notifications from the parent application reaching both applicants and approvers, thus improving the efficiency of remote security system inspections.
需要说明的一点是,在上述方法实施例中,主要从申请方客户端中的子应用程序、审批方客户端中的子应用程序、服务器交互的角度对本申请技术方案进行介绍说明,上述有关申请方客户端中的子应用程序执行的步骤可以单独实现成为申请方客户端中的子应用程序侧的网络安全巡检方法,上述有关审批方客户端中的子应用程序执行的步骤可以单独实现成为审批方客户端中的子应用程序侧的网络安全巡检方法,上述服务器执行的步骤可以单独实现成为服务器侧的网络安全巡检方法。It should be noted that, in the above method embodiments, the technical solution of this application is mainly described from the perspective of sub-applications in the applicant's client, sub-applications in the approver's client, and server interaction. The steps executed by the sub-applications in the applicant's client can be implemented independently as a network security inspection method on the sub-application side of the applicant's client, the steps executed by the sub-applications in the approver's client can be implemented independently as a network security inspection method on the sub-application side of the approver's client, and the steps executed by the server can be implemented independently as a network security inspection method on the server side.
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。The following are embodiments of the apparatus described in this application, which can be used to execute the embodiments of the method described in this application. For details not disclosed in the apparatus embodiments of this application, please refer to the embodiments of the method described in this application.
请参考图21,其示出了本申请一个实施例提供的网络安全巡检装置的框图。该装置具有实现上述网络安全巡检方法示例的功能,所述功能可以由硬件实现,也可以由硬件执行相应的软件实现。该装置2100可以包括:界面显示模块2110、指令获取模块2120、请求发送模块2130、结果接收模块2140和结果显示模块2150。Please refer to Figure 21, which shows a block diagram of a network security inspection device according to an embodiment of this application. This device has the functionality to implement the network security inspection method example described above. This functionality can be implemented in hardware or by hardware executing corresponding software. The device 2100 may include: an interface display module 2110, an instruction acquisition module 2120, a request sending module 2130, a result receiving module 2140, and a result display module 2150.
界面显示模块2110,用于在子应用程序中显示项目管理界面,所述项目管理界面中包括至少一个巡检项目的选项,所述子应用程序是依赖于母应用程序运行的程序;The interface display module 2110 is used to display a project management interface in a sub-application, the project management interface including at least one inspection item option, the sub-application being a program that depends on the parent application to run;
指令获取模块2120,用于获取针对所述至少一个巡检项目中的目标巡检项目的巡检执行指令;Instruction acquisition module 2120 is used to acquire inspection execution instructions for the target inspection item in the at least one inspection item;
请求发送模块2130,用于向服务器发送巡检执行请求,所述巡检执行请求用于请求执行与所述目标巡检项目相关的网络安全巡检;Request sending module 2130 is used to send an inspection execution request to the server, wherein the inspection execution request is used to request the execution of network security inspection related to the target inspection item;
结果接收模块2140,用于接收来自于所述服务器的所述目标巡检项目的巡检结果;The result receiving module 2140 is used to receive the inspection results of the target inspection item from the server.
结果显示模块2150,用于在所述子应用程序中显示所述巡检结果。The results display module 2150 is used to display the inspection results in the sub-application.
综上所述,本申请实施例提供的技术方案中,通过子应用程序实现网络安全巡检功能,由于子应用程序的用户群体广泛,且子应用程序具备无需安装、随时可用、用完即走、无需卸载等便利性,用户仅需打开母应用程序中的子应用程序,直接登录母应用程序的用户帐号信息,就可以在子应用程序中实现网络安全巡检,并不需要输入网络安全巡检对应的web网页地址,更不需要输入帐号密码,提高了网络安全巡检准备操作的便捷性。In summary, the technical solution provided in this application implements network security inspection functions through sub-applications. Since sub-applications have a wide user base and offer conveniences such as no installation required, always available, use and discard, and no uninstallation required, users only need to open the sub-application within the parent application and directly log in with their parent application's user account information to perform network security inspections within the sub-application. There is no need to enter the corresponding web page address for network security inspections, nor is there a need to enter an account password, thus improving the convenience of network security inspection preparation operations.
在示意性实施例中,如图22所示,所述指令获取模块2120,包括:指令接收单元2121、界面显示单元2122、参数获取单元2123和指令确认单元2124。In an illustrative embodiment, as shown in FIG22, the instruction acquisition module 2120 includes: an instruction receiving unit 2121, an interface display unit 2122, a parameter acquisition unit 2123, and an instruction confirmation unit 2124.
指令接收单元2121,用于接收针对所述目标巡检项目的选项的巡检发起指令;Instruction receiving unit 2121 is used to receive an inspection initiation instruction for the option of the target inspection item;
界面显示单元2122,用于显示所述目标巡检项目对应的巡检提交界面;The interface display unit 2122 is used to display the inspection submission interface corresponding to the target inspection item;
参数获取单元2123,用于获取在所述巡检提交界面中提交的巡检参数,所述巡检参数用于对目标网络地址进行网络安全巡检;The parameter acquisition unit 2123 is used to acquire the inspection parameters submitted in the inspection submission interface, and the inspection parameters are used to perform network security inspection on the target network address.
指令确认单元2124,用于在接收到针对所述巡检参数的提交指令时,确认获取到针对所述目标巡检项目的巡检执行指令;The instruction confirmation unit 2124 is used to confirm that an inspection execution instruction for the target inspection item has been obtained when a submission instruction for the inspection parameters is received.
其中,所述巡检执行请求中包括所述巡检参数。The inspection execution request includes the inspection parameters.
在示意性实施例中,所述巡检提交界面中包括网络地址输入框和测试用例选择列表,所述测试用例选择列表中包括至少一个测试用例,所述测试用例用于指示执行网络安全巡检时的攻击类型;In an illustrative embodiment, the inspection submission interface includes a network address input box and a test case selection list. The test case selection list includes at least one test case, which is used to indicate the type of attack when performing a network security inspection.
所述参数获取单元2123,用于:The parameter acquisition unit 2123 is used for:
获取在所述网络地址输入框中输入的所述目标网络地址;Obtain the target network address entered in the network address input box;
获取在所述测试用例选择列表中选择的目标测试用例,所述目标测试用例包括至少一个测试用例;Obtain the target test case selected from the test case selection list, wherein the target test case includes at least one test case;
其中,所述巡检参数包括所述目标网络地址和所述目标测试用例。The inspection parameters include the target network address and the target test case.
在示意性实施例中,所述结果显示模块2150,用于:In an illustrative embodiment, the result display module 2150 is used for:
在所述子应用程序中显示结果查询界面,所述结果查询界面中包括所述目标巡检项目的至少一个历史巡检记录的选项;The sub-application displays a results query interface, which includes an option for at least one historical inspection record of the target inspection item.
接收针对目标历史巡检记录的选项的查看指令,所述目标历史巡检记录是与所述巡检结果对应的历史巡检记录;Receive a viewing instruction for the option of the target historical inspection record, wherein the target historical inspection record is the historical inspection record corresponding to the inspection result;
在所述子应用程序中显示报告展示界面;The report display interface is shown in the sub-application;
在所述报告展示界面中显示所述巡检结果对应的巡检报告。The inspection report corresponding to the inspection results is displayed in the report display interface.
在示意性实施例中,所述结果显示模块2150,还用于:In an illustrative embodiment, the result display module 2150 is further configured to:
播放设定动画;Play the setup animation;
在所述设定动画播放完成之后,向所述服务器发送查询请求,所述查询请求用于请求查询所述目标巡检项目的至少一个历史巡检记录;After the set animation finishes playing, a query request is sent to the server. The query request is used to request at least one historical inspection record of the target inspection item.
所述结果接收模块2140,用于:The result receiving module 2140 is used for:
接收来自于所述服务器的所述目标巡检项目的至少一个历史巡检记录。Receive at least one historical inspection record of the target inspection item from the server.
在示意性实施例中,所述项目管理界面中还包括项目创建控件,所述项目创建控件用于新建巡检项目;In an illustrative embodiment, the project management interface also includes a project creation control, which is used to create a new inspection project;
所述装置2100,还包括:项目创建指令2160、信息获取模块2170。The device 2100 also includes: a project creation instruction 2160 and an information acquisition module 2170.
项目创建指令2160,用于接收针对所述项目创建控件的项目创建指令,显示项目创建界面;Project creation instruction 2160 is used to receive a project creation instruction for the project creation control and display the project creation interface;
信息获取模块2170,用于获取在所述项目创建界面中提交的新巡检项目的项目信息;Information acquisition module 2170 is used to acquire project information of new inspection projects submitted in the project creation interface;
所述请求发送模块2130,还用于向所述服务器发送项目审批请求,所述项目审批请求用于请求对所述新巡检项目进行审批,所述项目审批请求中包括所述新巡检项目的项目信息;The request sending module 2130 is further configured to send a project approval request to the server. The project approval request is used to request approval for the new inspection project, and the project approval request includes project information of the new inspection project.
所述结果接收模块2140,还用于接收来自于所述服务器的所述新巡检项目的项目审批结果;The result receiving module 2140 is also used to receive the project approval result of the new inspection project from the server;
所述结果显示模块2150,还用于在所述项目管理界面中显示所述项目审批结果。The result display module 2150 is also used to display the project approval result in the project management interface.
在示意性实施例中,所述装置2100,还包括:消息显示模块2180。In an illustrative embodiment, the device 2100 further includes a message display module 2180.
所述消息显示模块2180,用于:The message display module 2180 is used for:
获取所述项目审批结果中包含的各个字段,所述字段包括以下至少一项:项目审批时间、项目审批人员、项目审核结果;Obtain the various fields contained in the project approval result, wherein the fields include at least one of the following: project approval time, project approver, and project review result;
将各个所述字段填充至项目审批结果通知消息模板中,生成项目审批结果通知消息;Fill in each of the aforementioned fields into the project approval result notification message template to generate the project approval result notification message;
在所述母应用程序中显示所述项目审批结果通知消息。The project approval result notification message is displayed in the parent application.
在示意性实施例中,所述结果显示模块2150,还用于:In an illustrative embodiment, the result display module 2150 is further configured to:
获取针对所述目标巡检项目的选项的项目续期指令;Obtain the project renewal instruction for the selected option of the target inspection item;
向所述服务器发送项目续期请求,所述项目续期请求用于请求延长所述目标巡检项目的有效期;Send a project renewal request to the server, the project renewal request being used to request an extension of the validity period of the target inspection project;
接收来自于所述服务器的所述目标巡检项目的项目续期结果;Receive the project renewal result of the target inspection project from the server;
在所述项目管理界面中显示所述项目续期结果。The project renewal results are displayed in the project management interface.
在示意性实施例中,所述界面显示模块2110,还用于:In an illustrative embodiment, the interface display module 2110 is further configured to:
显示所述子应用程序的首页界面,所述首页界面中包括登录控件;Display the homepage interface of the sub-application, which includes a login control;
接收针对所述登录控件的确认指令,显示用户登录界面,所述用户登录界面中包括同意控件和拒绝控件,所述同意控件用于授权所述子应用程序登录所述母应用程序对应的用户帐号信息,所述拒绝控件用于拒绝授权所述子应用程序登录所述母应用程序对应的用户帐号信息;Receive a confirmation instruction for the login control and display a user login interface. The user login interface includes an agree control and a refuse control. The agree control is used to authorize the sub-application to log in to the user account information corresponding to the parent application, and the refuse control is used to refuse to authorize the sub-application to log in to the user account information corresponding to the parent application.
响应于接收到对所述同意控件的确认指令,执行所述在子应用程序中显示项目管理界面的步骤。In response to receiving a confirmation instruction for the consent control, the step of displaying the project management interface in the sub-application is performed.
请参考图23,其示出了本申请另一个实施例提供的网络安全巡检装置的框图。该装置具有实现上述网络安全巡检方法示例的功能,所述功能可以由硬件实现,也可以由硬件执行相应的软件实现。该装置2300可以包括:请求接收模块2310、请求发送模块2320、结果接收模块2330和结果发送模块2340。Please refer to Figure 23, which shows a block diagram of a network security inspection device according to another embodiment of this application. This device has the functionality to implement the network security inspection method example described above. This functionality can be implemented in hardware or by hardware executing corresponding software. The device 2300 may include: a request receiving module 2310, a request sending module 2320, a result receiving module 2330, and a result sending module 2340.
请求接收模块2310,用于接收来自于申请方客户端中的子应用程序的巡检执行请求,所述子应用程序为依赖于母应用程序运行的程序,所述巡检执行请求用于请求执行与目标巡检项目相关的网络安全巡检;The request receiving module 2310 is used to receive an inspection execution request from a sub-application in the applicant's client. The sub-application is a program that depends on the parent application to run. The inspection execution request is used to request the execution of a network security inspection related to the target inspection project.
请求发送模块2320,用于向云平台发送攻击测试请求,所述攻击测试请求中包括所述目标巡检项目的巡检参数,所述巡检参数用于对目标网络地址进行网络安全巡检;The request sending module 2320 is used to send an attack test request to the cloud platform. The attack test request includes the inspection parameters of the target inspection item. The inspection parameters are used to perform network security inspection on the target network address.
结果接收模块2330,用于接收来自于所述云平台的所述目标巡检项目的巡检结果;The result receiving module 2330 is used to receive the inspection results of the target inspection project from the cloud platform.
结果发送模块2340,用于向所述申请方客户端中的子应用程序发送所述巡检结果。The result sending module 2340 is used to send the inspection results to the sub-application in the applicant client.
综上所述,本申请实施例提供的技术方案中,通过子应用程序实现网络安全巡检功能,由于子应用程序的用户群体广泛,且子应用程序具备无需安装、随时可用、用完即走、无需卸载等便利性,用户仅需打开母应用程序中的子应用程序,直接登录母应用程序的用户帐号信息,就可以在子应用程序中实现网络安全巡检,并不需要输入网络安全巡检对应的web网页地址,更不需要输入帐号密码,提高了网络安全巡检准备操作的便捷性。In summary, the technical solution provided in this application implements network security inspection functions through sub-applications. Since sub-applications have a wide user base and offer conveniences such as no installation required, always available, use and discard, and no uninstallation required, users only need to open the sub-application within the parent application and directly log in with their parent application's user account information to perform network security inspections within the sub-application. There is no need to enter the corresponding web page address for network security inspections, nor is there a need to enter an account password, thus improving the convenience of network security inspection preparation operations.
在示意性实施例中,所述结果接收模块2330,用于:In an illustrative embodiment, the result receiving module 2330 is configured to:
向所述云平台中的云数据库发送结果查询请求,所述结果查询请求中包括所述目标巡检项目的标识,所述云数据库中存储有至少一个巡检项目的巡检结果;Send a result query request to the cloud database in the cloud platform. The result query request includes the identifier of the target inspection item. The cloud database stores the inspection results of at least one inspection item.
接收来自于所述云数据库的所述目标巡检项目的巡检结果。Receive the inspection results of the target inspection project from the cloud database.
在示意性实施例中,所述请求接收模块2310,还用于接收来自于所述申请方客户端中的子应用程序的查询请求,所述查询请求用于请求查询所述目标巡检项目的至少一个历史巡检记录;In an illustrative embodiment, the request receiving module 2310 is further configured to receive a query request from a sub-application in the applicant client, the query request being used to request query at least one historical inspection record of the target inspection project.
所述结果接收模块2330,还用于向云平台中的云数据库转发所述查询请求;接收来自于所述云数据库的所述目标巡检项目的至少一个历史巡检记录;The result receiving module 2330 is also used to forward the query request to the cloud database in the cloud platform; and to receive at least one historical inspection record of the target inspection project from the cloud database.
所述结果发送模块2340,还用于向所述申请方客户端中的子应用程序发送所述目标巡检项目的至少一个历史巡检记录。The result sending module 2340 is also used to send at least one historical inspection record of the target inspection project to a sub-application in the applicant client.
在示意性实施例中,所述结果发送模块2340,还用于以下至少一项:In an illustrative embodiment, the result sending module 2340 is further configured to include at least one of the following:
接收来自于所述申请方客户端中的子应用程序的项目审批请求,所述项目审批请求用于请求对新巡检项目进行审批,所述项目审批请求中包括所述新巡检项目的项目信息;向审批方客户端中的子应用程序发送项目审批信息,所述项目审批信息中包括所述新巡检项目的项目信息;接收来自于所述审批方客户端中的子应用程序的项目审批结果;向所述申请方客户端中的子应用程序发送所述项目审批结果;The system receives a project approval request from a sub-application in the applicant's client, the project approval request being used to request approval for a new inspection project, the project approval request including project information of the new inspection project; sends project approval information to the sub-application in the approver's client, the project approval information including project information of the new inspection project; receives a project approval result from the sub-application in the approver's client; and sends the project approval result to the sub-application in the applicant's client.
接收来自于所述申请方客户端中的子应用程序的项目续期请求,所述项目续期请求用于请求延长所述目标巡检项目的有效期;向所述审批方客户端中的子应用程序发送项目续期信息,所述项目续期信息中包括所述目标巡检项目的项目信息;接收来自于所述审批方客户端中的子应用程序的项目续期结果;向所述申请方客户端中的子应用程序发送所述项目续期结果。The system receives a project renewal request from a sub-application in the applicant's client, the project renewal request being used to request an extension of the validity period of the target inspection project; sends project renewal information, including project information of the target inspection project, to the sub-application in the approver's client; receives a project renewal result from the sub-application in the approver's client; and sends the project renewal result to the sub-application in the applicant's client.
在示意性实施例中,如图24所示,所述装置2300,还包括:信息发送模块2350。In an illustrative embodiment, as shown in FIG24, the device 2300 further includes an information sending module 2350.
所述信息发送模块2350,用于:The information sending module 2350 is used for:
接收来自于所述申请方客户端中的子应用程序的帐号信息获取请求,所述帐号信息获取请求用于请求获取所述申请方客户端对应的用户帐号信息;Receive an account information retrieval request from a sub-application in the applicant's client, the account information retrieval request being used to request the user account information corresponding to the applicant's client;
获取所述申请方客户端对应的用户帐号信息;Obtain the user account information corresponding to the applicant's client;
向所述申请方客户端中的子应用程序发送所述用户帐号信息。Send the user account information to the sub-application in the applicant's client.
需要说明的是,上述实施例提供的装置,在实现其功能时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内容结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的装置与方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that the apparatus provided in the above embodiments is only illustrated by the division of the above functional modules when implementing its functions. In actual applications, the above functions can be assigned to different functional modules as needed, that is, the content structure of the device can be divided into different functional modules to complete all or part of the functions described above. In addition, the apparatus and method embodiments provided in the above embodiments belong to the same concept, and the specific implementation process can be found in the method embodiments, which will not be repeated here.
请参考图25,其示出了本申请一个实施例提供的终端2500的结构框图。该终端2500可以是手机、平板电脑、智能电视、多媒体播放设备、PC等。该终端2500可用于实施上述实施例中提供的网络安全巡检方法,该终端2500可以是图1实施环境中介绍的申请方终端10。Please refer to Figure 25, which shows a structural block diagram of a terminal 2500 provided in one embodiment of this application. The terminal 2500 can be a mobile phone, tablet computer, smart TV, multimedia playback device, PC, etc. The terminal 2500 can be used to implement the network security inspection method provided in the above embodiments, and the terminal 2500 can be the applicant terminal 10 described in the implementation environment of Figure 1.
通常,终端2500包括有:处理器2501和存储器2502。Typically, terminal 2500 includes a processor 2501 and a memory 2502.
处理器2501可以包括一个或多个处理核心,比如4核心处理器、8核心处理器等。处理器2501可以采用DSP(Digital Signal Processing,数字信号处理)、FPGA(FieldProgrammable Gate Array,现场可编程门阵列)、PLA(Programmable Logic Array,可编程逻辑阵列)中的至少一种硬件形式来实现。处理器2501也可以包括主处理器和协处理器,主处理器是用于对在唤醒状态下的数据进行处理的处理器,也称CPU(Central ProcessingUnit,中央处理器);协处理器是用于对在待机状态下的数据进行处理的低功耗处理器。在一些实施例中,处理器2501可以在集成有GPU(Graphics Processing Unit,图像处理器),GPU用于负责显示屏所需要显示的内容的渲染和绘制。一些实施例中,处理器2501还可以包括AI(Artificial Intelligence,人工智能)处理器,该AI处理器用于处理有关机器学习的计算操作。Processor 2501 may include one or more processing cores, such as a quad-core processor, an octa-core processor, etc. Processor 2501 may be implemented using at least one hardware form selected from DSP (Digital Signal Processing), FPGA (Field Programmable Gate Array), and PLA (Programmable Logic Array). Processor 2501 may also include a main processor and a coprocessor. The main processor, also known as a CPU (Central Processing Unit), is used to process data in the wake-up state; the coprocessor is a low-power processor used to process data in the standby state. In some embodiments, processor 2501 may integrate a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content to be displayed on the screen. In some embodiments, processor 2501 may also include an AI (Artificial Intelligence) processor, which is used to handle computational operations related to machine learning.
存储器2502可以包括一个或多个计算机可读存储介质,该计算机可读存储介质可以是非暂态的。存储器2502还可包括高速随机存取存储器,以及非易失性存储器,比如一个或多个磁盘存储设备、闪存存储设备。The memory 2502 may include one or more computer-readable storage media, which may be non-transitory. The memory 2502 may also include high-speed random access memory and non-volatile memory, such as one or more disk storage devices or flash memory devices.
在一些实施例中,终端2500还可选包括有:外围设备接口2503和至少一个外围设备。处理器2501、存储器2502和外围设备接口2503之间可以通过总线或信号线相连。各个外围设备可以通过总线、信号线或电路板与外围设备接口2503相连。具体地,外围设备可以包括:显示屏2504、音频电路2505、通信接口2506和电源2507中的至少一种。In some embodiments, the terminal 2500 may also optionally include a peripheral device interface 2503 and at least one peripheral device. The processor 2501, memory 2502, and peripheral device interface 2503 can be connected via a bus or signal line. Each peripheral device can be connected to the peripheral device interface 2503 via a bus, signal line, or circuit board. Specifically, the peripheral device may include at least one of a display screen 2504, audio circuitry 2505, communication interface 2506, and power supply 2507.
本领域技术人员可以理解,图25中示出的结构并不构成对终端2500的限定,可以包括比图示更多或更少的组件,或者组合某些组件,或者采用不同的组件布置。Those skilled in the art will understand that the structure shown in FIG25 does not constitute a limitation on the terminal 2500, and may include more or fewer components than shown, or combine certain components, or use different component arrangements.
请参考图26,其示出了本申请一个实施例提供的服务器2600的结构示意图。该服务器2600可用于实施上述实施例中提供的服务器侧的网络安全巡检方法,该服务器2600可以是图1所示实施环境中介绍的服务器30。具体来讲:Please refer to Figure 26, which shows a schematic diagram of the structure of a server 2600 provided in one embodiment of this application. This server 2600 can be used to implement the server-side network security inspection method provided in the above embodiments. The server 2600 can be the server 30 described in the implementation environment shown in Figure 1. Specifically:
所述服务器2600包括中央处理单元(Central Processing Unit,CPU)2601、包括RAM(Random Access Memory,随机存取存储器)2602和ROM(Read-Only Memory,只读存储器)2603的系统存储器2604,以及连接系统存储器2604和中央处理单元2601的系统总线2605。所述服务器2600还包括帮助计算机内的各个器件之间传输信息的基本输入/输出系统(I/O系统,Input/Output系统)2606,和用于存储操作系统2613、应用程序2614和其他程序模块2615的大容量存储设备2607。The server 2600 includes a central processing unit (CPU) 2601, a system memory 2604 including RAM (Random Access Memory) 2602 and ROM (Read-Only Memory) 2603, and a system bus 2605 connecting the system memory 2604 and the CPU 2601. The server 2600 also includes a basic input/output system (I/O system) 2606 to facilitate information transfer between various devices within the computer, and a mass storage device 2607 for storing the operating system 2613, application programs 2614, and other program modules 2615.
所述基本输入/输出系统2606包括有用于显示信息的显示器2608和用于用户输入信息的诸如鼠标、键盘之类的输入设备2609。其中所述显示器2608和输入设备2609都通过连接到系统总线2605的输入输出控制器2610连接到中央处理单元2601。所述基本输入/输出系统2606还可以包括输入输出控制器2610以用于接收和处理来自键盘、鼠标、或电子触控笔等多个其他设备的输入。类似地,输入输出控制器2610还提供输出到显示屏、打印机或其他类型的输出设备。The basic input/output system 2606 includes a display 2608 for displaying information and an input device 2609 for user input, such as a mouse or keyboard. Both the display 2608 and the input device 2609 are connected to the central processing unit 2601 via an input/output controller 2610 connected to the system bus 2605. The basic input/output system 2606 may also include the input/output controller 2610 for receiving and processing input from multiple other devices such as a keyboard, mouse, or electronic stylus. Similarly, the input/output controller 2610 also provides output to a display screen, printer, or other types of output devices.
所述大容量存储设备2607通过连接到系统总线2605的大容量存储控制器(未示出)连接到中央处理单元2601。所述大容量存储设备2607及其相关联的计算机可读介质为服务器2600提供非易失性存储。也就是说,所述大容量存储设备2607可以包括诸如硬盘或者CD-ROM(Compact Disc Read-Only Memory,只读光盘)驱动器之类的计算机可读介质(未示出)。The mass storage device 2607 is connected to the central processing unit 2601 via a mass storage controller (not shown) connected to the system bus 2605. The mass storage device 2607 and its associated computer-readable media provide non-volatile storage for the server 2600. That is, the mass storage device 2607 may include computer-readable media (not shown) such as a hard disk or a CD-ROM (Compact Disc Read-Only Memory) drive.
不失一般性,所述计算机可读介质可以包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其他数据等信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动介质。计算机存储介质包括RAM、ROM、EPROM(Erasable Programmable Read-Only Memory,可擦除可编程只读存储器)、EEPROM(Electrically Erasable Programmable Read-Only Memory,电可擦可编程只读存储器)、闪存(Flash Memory)或其他固态存储设备,CD-ROM、DVD(Digital Versatile Disc,数字通用光盘)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。当然,本领域技术人员可知所述计算机存储介质不局限于上述几种。上述的系统存储器2604和大容量存储设备2607可以统称为存储器。Without loss of generality, the computer-readable medium may include computer storage media and communication media. Computer storage media include volatile and non-volatile, removable and non-removable media implemented using any method or technology for storing information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media include RAM, ROM, EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash memory or other solid-state storage devices, CD-ROM, DVD (Digital Versatile Disc) or other optical storage, magnetic tape cassettes, magnetic tape, disk storage, or other magnetic storage devices. Of course, those skilled in the art will recognize that the computer storage media are not limited to the above-mentioned types. The system memory 2604 and mass storage device 2607 described above can be collectively referred to as memory.
根据本申请的各种实施例,所述服务器2600还可以通过诸如因特网等网络连接到网络上的远程计算机运行。也即服务器2600可以通过连接在所述系统总线2605上的网络接口单元2611连接到网络2612,或者说,也可以使用网络接口单元2611来连接到其他类型的网络或远程计算机系统(未示出)。According to various embodiments of this application, the server 2600 can also be connected to a remote computer on a network, such as the Internet. That is, the server 2600 can be connected to the network 2612 via the network interface unit 2611 connected to the system bus 2605, or the network interface unit 2611 can be used to connect to other types of networks or remote computer systems (not shown).
所述存储器还包括一个或者一个以上的程序,所述一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行。上述一个或者一个以上程序包含用于实现上述服务器侧的网络安全巡检方法的指令。The memory also includes one or more programs stored in the memory and configured to be executed by one or more processors. These programs contain instructions for implementing the aforementioned server-side network security inspection method.
在示例性实施例中,还提供了一种终端,所述终端包括处理器和存储器,所述存储器中存储有至少一条指令、至少一段程序、代码集或指令集。所述至少一条指令、至少一段程序、代码集或指令集经配置以由一个或者一个以上处理器执行,以实现上述终端侧的网络安全巡检方法。In an exemplary embodiment, a terminal is also provided, the terminal including a processor and a memory, the memory storing at least one instruction, at least one program, code set, or instruction set. The at least one instruction, at least one program, code set, or instruction set is configured to be executed by one or more processors to implement the aforementioned network security inspection method on the terminal side.
在示例性实施例中,还提供了一种服务器,所述服务器包括处理器和存储器,所述存储器中存储有至少一条指令、至少一段程序、代码集或指令集。所述至少一条指令、至少一段程序、代码集或指令集经配置以由一个或者一个以上处理器执行,以实现上述服务器侧的网络安全巡检方法。In an exemplary embodiment, a server is also provided, the server including a processor and a memory, the memory storing at least one instruction, at least one program, code set, or instruction set. The at least one instruction, at least one program, code set, or instruction set is configured to be executed by one or more processors to implement the aforementioned server-side network security inspection method.
在示例性实施例中,还提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或所述指令集在被终端的处理器执行时实现上述终端侧的网络安全巡检方法。In an exemplary embodiment, a computer-readable storage medium is also provided, which stores at least one instruction, at least one program, code set, or instruction set, wherein the at least one instruction, the at least one program, the code set, or the instruction set implements the above-described network security inspection method on the terminal side when executed by the processor of a terminal.
在示例性实施例中,还提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或所述指令集在被服务器的处理器执行时实现上述服务器侧的网络安全巡检方法。In an exemplary embodiment, a computer-readable storage medium is also provided, wherein at least one instruction, at least one program, code set, or instruction set is stored therein, wherein the at least one instruction, the at least one program, the code set, or the instruction set implements the above-described server-side network security inspection method when executed by a server's processor.
在示例性实施例中,还提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。终端的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该终端执行上述终端侧的网络安全巡检方法。In an exemplary embodiment, a computer program product or computer program is also provided, which includes computer instructions stored in a computer-readable storage medium. The processor of the terminal reads the computer instructions from the computer-readable storage medium and executes the computer instructions, causing the terminal to perform the aforementioned terminal-side network security inspection method.
在示例性实施例中,还提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。服务器的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该服务器执行上述服务器侧的网络安全巡检方法。In an exemplary embodiment, a computer program product or computer program is also provided, which includes computer instructions stored in a computer-readable storage medium. The server's processor reads the computer instructions from the computer-readable storage medium and executes the computer instructions, causing the server to perform the aforementioned server-side network security inspection method.
应当理解的是,在本文中提及的“多个”是指两个或两个以上。另外,本文中描述的步骤编号,仅示例性示出了步骤间的一种可能的执行先后顺序,在一些其它实施例中,上述步骤也可以不按照编号顺序来执行,如两个不同编号的步骤同时执行,或者两个不同编号的步骤按照与图示相反的顺序执行,本申请实施例对此不作限定。It should be understood that "multiple" as mentioned herein refers to two or more. Furthermore, the step numbers described herein are merely illustrative of one possible order of execution. In some other embodiments, the steps may not be executed in numerical order, such as two steps with different numbers being executed simultaneously, or two steps with different numbers being executed in the reverse order of the illustration. This application does not limit this practice.
以上所述仅为本申请的示例性实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above description is merely an exemplary embodiment of this application and is not intended to limit this application. Any modifications, equivalent substitutions, improvements, etc., made within the spirit and principles of this application should be included within the protection scope of this application.
Claims (18)
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK40030082A HK40030082A (en) | 2021-02-26 |
| HK40030082B true HK40030082B (en) | 2024-02-23 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7595723B2 (en) | Deploy dynamic policies to detect threats and provide access visibility | |
| JP7279227B2 (en) | Techniques for Monitoring Privileged Users and Detecting Anomalous Activity in Computing Environments | |
| US11265329B2 (en) | Mechanisms for anomaly detection and access management | |
| US11206451B2 (en) | Information interception processing method, terminal, and computer storage medium | |
| US10643149B2 (en) | Whitelist construction | |
| US10764290B2 (en) | Governed access to RPA bots | |
| CN111541768B (en) | Unified provisioning of applications on devices in an enterprise system | |
| US9223961B1 (en) | Systems and methods for performing security analyses of applications configured for cloud-based platforms | |
| KR101810755B1 (en) | Use of freeform metadata for access control | |
| CN111787030B (en) | Network security inspection method, device, equipment and storage medium | |
| US20240348620A1 (en) | Computing system permission administration engine | |
| US10050899B2 (en) | Data processing method, apparatus, client, server and system | |
| CN114144798A (en) | Security incident investigation event capture | |
| US8938680B2 (en) | Methods and apparatus for E-mail-based management of virtualized environments | |
| CN114207614A (en) | Safety investigation platform | |
| US20250202888A1 (en) | Privacy-preserving virtual email system | |
| CN114175067A (en) | Incident survey workspace generation and survey control | |
| HK40030082B (en) | Network security patrol method and apparatus, device and storage medium | |
| HK40030082A (en) | Network security patrol method and apparatus, device and storage medium | |
| US11475122B1 (en) | Mitigating malicious client-side scripts | |
| Ii | TECHNICAL EVALUATION AND LEGAL OPINION OF WARDEN: A NETWORK FORENSICS TOOL | |
| CN115150170A (en) | Security policy configuration method and device, electronic equipment and storage medium |