Computer network risk evaluation device and method therefor

A computer network and risk assessment technology, which is applied in the field of computer network risk assessment, can solve problems such as high cost and complicated operation, and achieve the effects of reducing cost, improving protection ability, and simplifying complexity

Active Publication Date: 2007-10-31
FORTINET
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a deployment method is not only complicated to operate but also expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network risk evaluation device and method therefor
  • Computer network risk evaluation device and method therefor
  • Computer network risk evaluation device and method therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] FIG. 1 is a block diagram of a network risk assessment device of the present invention. As shown in FIG. 1 , the network risk assessment device of the present invention includes a vulnerability scanner 1, a gateway device 2 (such as a firewall or a router), and a scanning proxy server 3 behind the gateway for generating a network topology and processing scanning data packets. Use the risk assessment device of the present invention to perform risk assessment on multiple hosts 4-7 in the network as shown in FIG. 1 as PC1-PC4. Among them, a gateway is a packet filtering device similar to a firewall and a router. It contains information about the topology of the network. The scanning proxy server 3 located behind the gateway can generate a network topology diagram by automatically obtaining information from the gateway device 2 or by manually configuring it. The vulnerability scanner 1 can obtain the network topology from the scanning proxy server through a VPN tunnel or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device and method for assessing the risk of computer network, the device in invention includes: gateway, which can obtain the network topology structure information; loophole scanner, which can obtain the network topology structure information from the scanning agent sever, and builds the scanning strategy according to the network topology structure information and the allocation. The method in the invention includes following steps: step1. The scanning agent sever obtains the network topology structure information from the gateway; step 2, loophole scanner obtains the network topology structure information from the scanning agent sever; step 3, the loophole scanner builds the scanning strategy according to the network topology structure information, and scans according to the scanning strategy; step 4, the loophole scanner analyzes the scanning result, and generates the loophole report and/or remedy report. Using the invention it can protect the risk in the internal web effectively.

Description

technical field [0001] The invention relates to a computer network, in particular to a device and a method for realizing risk assessment of a computer network through a gateway and a vulnerability scanner. Background technique [0002] In the existing technology, the security gateway and the vulnerability scanner are two independent devices and cannot work together. The existing technology is to implement security protection by integrating functions such as firewall, anti-virus, and IPS / IDS at the gateway. Vulnerability scanners need to be deployed separately and manually configured to work. Existing technologies only focus on the protection at the gateway, which can only resist external attacks. However, according to police records, 70 percent of attacks originate from within the network. The vulnerability scanner can audit the risks existing in the intranet, thereby effectively reducing the possibility of internal attacks. But these two devices cannot work together in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/14H04L12/28H04L69/40
Inventor 王磊
Owner FORTINET
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products