The 2021 China Website Security Report releases the exposure of high-risk ports, which deserves attention. The 2021 China Network Security Industry Analysis Report

1 year ago (2023-12-24) Chief Editor
5 minutes
two hundred and forty-eight
zero

"Website is an important information platform for governments and enterprises. Website security is also one of the most concerned network security issues for government and enterprise institutions." Recently, Qianxin Industry Security Research Center and other internal departments jointly released the 2021 China Website Security Report (hereinafter referred to as the Report), which covers high-risk port exposure, third-party vulnerability report, website attack interception, DDoS attack Botnet and other dimensions, carried out in-depth analysis and research on the overall situation of domestic website security in 2021.

High risk port exposure causes concern. Information leakage vulnerabilities account for up to 36%

In recent years, the website security construction of domestic large and medium-sized government and enterprise institutions has made great progress, but security risks still exist widely. According to the data in the Report, in 2021, Qianxin Global Eagle System will monitor 1.83 billion domestic website assets, covering 60 million independent Web IP addresses, and each independent Web IP address will correspond to 30.5 websites on average.

Among all monitored websites, there are about 66.446 million websites with high-risk protocol (such as SSH, SMB, MySQL, etc.) port exposure (referred to as high-risk port exposure), accounting for 3.6% of the total monitored websites. From the perspective of geographical distribution, East China has the largest number of websites with high-risk port exposure, accounting for 47.6% nationwide, followed by South China, accounting for 22.5%; North China ranked third, accounting for 11.1%.

"The third-party vulnerability report is an important channel for the collection and collection of website security vulnerabilities." For the vulnerability report, the Report shows that throughout 2021, the Butian Vulnerability Response Platform will include 146293 security vulnerabilities of various websites nationwide, involving 115243 websites. From the distribution of vulnerability causes, 99.1% of the relatively isolated event type vulnerabilities are caused by the website's own development, construction, operation and maintenance management, and only 0.9% of the common vulnerabilities in similar websites or functional modules of similar websites are caused by website development platforms, development tools or development languages.

In addition, from the perspective of the technical types of vulnerabilities, in 2021, among the website security vulnerabilities included in the Patian platform, information disclosure vulnerabilities accounted for the highest percentage, reaching 36.0%, followed by SQL injection vulnerabilities, accounting for 18.4%, and weak passwords accounting for 12.9%. From the perspective of industry distribution, IT information technology and Internet communication are the most, accounting for 35.5% of the country's total, followed by manufacturing, education and training.

Hackers can also take advantage of website security vulnerabilities to launch attacks on websites. The use of website protection means can detect and intercept such attacks. The Report shows that in 2021, Qianxin's website guards will intercept 9.51 billion attacks on various websites for 403000 websites nationwide, with an average of 26.049 million attacks per day. Among them, abnormal protocol requests account for the highest proportion, accounting for 58.1% of the total number of website guards' attacks intercepted. The types of attacks ranked top 10 in terms of interceptions, accounting for 84.7% of the total interceptions.

NTP becomes the main type of DDoS attacks Botnet is still a parasitic tumor of the Internet

According to the DDoS attacks, the data in the Report shows that throughout 2021, Qi'an Information Technology Research Institute has monitored a total of 287000 IP addresses across the country were subjected to 842000 DDoS attacks, of which about 4.3% were DDoS attacks, and a variety of other types of attack methods were used together. Attackers use a variety of attack means according to the specific environment of the target system, which also increases the cost of response and processing of the attacked. From the perspective of attack types, NTP is the largest, accounting for 80.4% of the total number of DDoS attacks in China throughout the year; Jenkins, Memcached and SSDP are next. It can be seen that NTP, Jenkins, Memcached, SSDP, etc. are the main attack methods of DDoS.

In the above statistics, it should be noted that the number of DDoS attacks is counted in "waves". That is, in a continuous period of time, a continuous DDoS attack on an IP is considered as a "wave" attack, which is counted as one. This is different from the statistical method of the number of DDoS attack interceptions in the previous section.

Botnet is a cancer parasitic on the Internet. Attackers will use botnets to launch vulnerability exploitation, weak password explosion, malicious scanning and other types of attacks, and when the attack is successful, issue Trojan files to achieve their own propagation. For the botnet, Qianxin Technology Research Institute has conducted long-term security monitoring on the domestic Internet. The monitoring shows that in 2021, there will be about 530000 active botnet infected node IP addresses nationwide (de duplication statistics). Among them, there are about 72000 vulnerability attack sources and 388000 weak password explosion sources.

The year 2021 is the first year of the 14th Five Year Plan and the year of convergence and transformation of the two centenary goals. The development of national informatization and digitalization has entered a new strategic stage, and the construction of network security has also entered a new historical period. The new idea of network security construction represented by the "endogenous security framework" has become a powerful ideological weapon for the construction and development of network security in the new era of domestic large and medium-sized government and enterprise institutions. The Report integrates multiple dimensions of website security, integrates technical advantages and professional capabilities of multiple internal departments, and deeply excavates and analyzes relevant data, hoping to help domestic government and enterprise customers understand the overall situation of current website security in a more comprehensive and in-depth way.

Reviewed by: Yu Zaozhao

Editor in charge: Huo Yue

Editor: Hu Na

This article is written by: Chief Editor Published on Software Development of Little Turkey , please indicate the source for reprinting: //hongchengtech.cn/blog/3169.html
Kuke_WP editor
author

Related recommendations

1 year ago (2024-02-20)

What technologies have been applied and developed in the field of new media, and the application of new technologies in media

In the field of new media, many technologies have been applied and developed. These include: cloud computing: cloud computing technology enables new media companies to develop and deploy applications more quickly, and can dynamically adjust resources according to needs. Big data: New media companies can use big data technology to analyze massive user data, understand user preferences, behavior habits and other information
nine hundred and seventy-one
one
1 year ago (2024-02-20)

WMS warehouse management system, promoting the transformation of warehousing from extensive to fine management, WMS warehouse management

Warehousing is extremely important for the manufacturing industry and is an important guarantee for the survival and development of manufacturing enterprises. However, with the expansion of manufacturing enterprises' business, the traditional warehouse management has been unable to respond to business changes quickly. The extensive management mode not only makes the warehouse operation not smooth, but also increases the storage cost. Therefore, it is necessary for manufacturing enterprises to deploy a WMS warehouse management system
eight hundred and forty-eight
one
1 year ago (2024-02-20)

How to select MES system? Main contents of MES production management

Original title: How to select MES system? The main content of MES production management Production and manufacturing activities are the core activities of manufacturing enterprises. As the entity unit of manufacturing activities, planning objectives and the realization of enterprise value, workshop management is the focus of enterprise management. With the rapid development of manufacturing industry, MES is the focus and current hot spot of manufacturing enterprise information automation system
nine hundred and sixty-four
zero
1 year ago (2024-02-20)

The WeChat management system can manage the information content of WeChat more effectively. Let's manage the data of WeChat here

Original title: WeChat management system manages the information content of WeChat more effectively. Many enterprises will assign work to WeChat, because no one wants their personal WeChat to mix work and other related knowledge, but someone will always use the company's loopholes to do something harmful to the company's interests. Don't think such things are rare. I learned about a media financing company in Shenzhen. They have 3
seven hundred and seventy-seven
zero
1 year ago (2024-02-19)

Student electronic file management system, three-dimensional communication space of "home", "school" and "community", and school electronic files

In the era of big data, in the process of recording the growth of students, the school reexamines the management of student files, moves with the times, and promotes the reform of student growth files with new thinking. "Electronic files of primary and secondary school students' growth records" have been gradually introduced into educational management, and show vigorous vitality. Student file management system is an indispensable part of the school, its content for the school
five hundred and seventy-one
zero
1 year ago (2024-02-19)

Ruizhe Information: Select Sitecore? Or... just six steps to choose a content management system, Ruizhe Information Technology Service Co., Ltd

The content management system (CMS) is an important part of the success of website construction. At present, the content management system on the network is relatively complex. It is not easy to find a good content management system that is very suitable for the current digital marketing environment. Before we compare the functionality, operation, scalability, security and other specific performance of the major CMS systems, we need to achieve
three hundred and forty-three
zero

comment

0 people have participated in the review

Scan code to add WeChat

contact us

WeChat: Kuzhuti
Online consultation: