| With the continuous acceleration of informatization and digitalization,cyberspace has become an indispensable part of people’ s daily work,life,entertainment and other activities.However,cyberspace also faces various security threats and risks,such as cyber attacks,malware,phishing,etc.These security threats have caused great threats and impacts on the security of individuals,organizations and countries.In order to ensure the security of cyberspace,a series of measures must be taken for network security management and protection.As the basic work of network security management and protection,cyberspace asset surveying and mapping has important research background and practical significance.At present,countries have also taken major actions,actively investing in the construction of cyberspace,and promulgating national strategies for cyberspace in order to compete for the commanding heights.Network security is one of the key development goals of all countries.In order to defend their own security,it is necessary to understand a country’ s network infrastructure and equipment utilization rate,so that it can be calmly dealt with in future cyberspace warfare and achieve targeted targets.Therefore,it is necessary to develop a network asset that can comprehensively discover various network devices,operating systems,software versions,etc.Detection and identification of malicious sites is of great significance for improving the security level of cyberspace and ensuring the stable operation of cyberspace.This paper proposes a method of comprehensively utilizing multiple network asset detection technologies,designs and implements a set of efficient,accurate,and easy-to-implement malicious site detection and website vulnerability detection methods,and based on this,develops a network space asset mapping and security evaluation platform.The platform adopts a variety of advanced detection technologies and provides a comprehensive set of data processing and analysis tools,which can conduct comprehensive mapping and evaluation of various devices in cyberspace,and also realize the security monitoring of network devices and vulnerability assessment.The research results of this paper can not only provide a new technical means and method for cyberspace mapping and security assessment,but also provide important support and guarantee for network security and informatization construction,which has important academic and practical significance. |