Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for combining system managing and fragility scan

A system management and vulnerability technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inability to scan, and achieve the effect of improving accuracy and scanning efficiency

Inactive Publication Date: 2009-09-02
BEIJING VENUS INFORMATION TECH +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantage is that there are few vulnerabilities that can be scanned. For local vulnerabilities like IE, it cannot be scanned without authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for combining system managing and fragility scan

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] Example: such as figure 1 , figure 2 As shown, install "Control Center", "Display Center", "Database", and "Log Analysis" on one machine; install "Scan Engine" on a machine in the domain, and log in as a domain administrator domain, and run the scan engine. Connect "Control Center" and "Scan Engine" through TCP / IP protocol.

[0027] The "Control Center" formulates scan tasks, sends the scan tasks to the "Scan Engine", and the "Scan Engine" scans the hosts in the domain, and uploads the scan results to the "Control Center". The "Control Center" saves the scanning results to the "Database", and at the same time forwards the data to the "Display Center" for users to view in time. Users can analyze and view historical scan results through the "Log Analysis" module.

[0028] A method combining system management and vulnerability scanning; including the following steps:

[0029] 1. Log in to the system with domain administrator privileges and run the scan engine;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system combining system management and vulnerability scanning, comprising: 1. a network scanning engine; 2. system management; 3. a display unit; 4. a log analysis unit. The Windows Domain Network Vulnerability Scanning and Management System (DSS: Domain Scanner System) mainly uses the powerful functions of domain management in the network vulnerability scanning and management system to remotely scan the hosts in the domain for vulnerabilities and find the hosts more effectively. The hidden dangers and defects existing in the system can improve the scanning accuracy and scanning efficiency.

Description

technical field [0001] The present invention relates to a method and system combining system management and vulnerability scanning. The present invention relates to the field of computer network security, a method and system combining system management and vulnerability scanning. Vulnerability scanning is added on the basis of management to improve vulnerability Scanning accuracy solves the defect that common vulnerability scanning tools cannot detect passive attacks. Background technique [0002] Existing vulnerabilities refer to the defects in computer software (including operating systems and application programs) or configuration defects caused by improper use. These defects may be exploited by hackers to invade or attack computer systems. [0003] Vulnerability scanning technology is a security technology for detecting remote or local system vulnerabilities. Network vulnerability scanning is a network-based system vulnerability scanning technology for remote hosts. Its...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 汤国祥骆拥政李杰杨晨宇
Owner BEIJING VENUS INFORMATION TECH