Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning system oriented to safety assessment and processing method thereof

A network security assessment and vulnerability scanning technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as rough algorithms, large errors in assessment reports, and no early warning function, so as to achieve accurate scanning report results and prevent intrusions. , the effect of accurate and authoritative network security assessment results

Active Publication Date: 2011-06-01
XIAMEN MEIYA PICO INFORMATION
View PDF1 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the structural principle of this vulnerability scanning system in the prior art is relatively simple, there are several obvious deficiencies: first, this mode is relatively passive for vulnerability scanning, and generally it is when the user needs to detect the security of the system. It is impossible to discover system vulnerabilities in time; secondly, this mode cannot set up an effective scheduling mechanism for scanning tasks to realize regular scanning; thirdly, this mode generally divides the vulnerability levels into high, medium, and Low, then simply give a weight, and finally calculate and take the weighted average, because the algorithm is relatively rough, resulting in large errors in the evaluation report; fourth, this mode has no early warning function, and generally scans a system or network for vulnerabilities. Waiting for a long time, the user usually waits until the entire scan is over before repairing the vulnerability. If there is an intrusion attack targeting the corresponding vulnerability at this time, the user will not be able to find out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning system oriented to safety assessment and processing method thereof
  • Vulnerability scanning system oriented to safety assessment and processing method thereof
  • Vulnerability scanning system oriented to safety assessment and processing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Examples, see figure 2 As shown, a kind of vulnerability scanning system oriented to network security assessment of the present invention, its vulnerability scanning system comprises server end 1 and client 2 adopting C / S structure, and this server end 1 runs on Unix or Linux platform, and this client end 2 Run on the Windows platform;

[0057] The server-side 1 includes:

[0058] The scanning engine service module 16 is used to accept the request of the client 2 and execute the scanning task; the main function of the scanning engine service module 16 is to be responsible for selecting a specific plug-in from the plug-in library according to user customization, coordinating the relationship between the scanning plug-ins, and executing The scanning program, which stores the results in the scanning history and is responsible for sending them to the client;

[0059] The client verification module 19 is used to accept the request of the client 2 to verify the client cert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability scanning system oriented to safety assessment and a processing method thereof. The system provided by the invention comprises a server side and a client side which are of a C / S (client / server) structure; the server side operates on a Unix or Linux platform, and the client side operates on a Windows platform; the server side comprises a client side verification module, a scanning engine service module, a scheduling process module, an invasion detecting module and the like; the client side comprises a server verification module, a scanning configuration module, a pre-warning module, an evaluation algorithm module, a scanning report processing module, a vulnerability expansion and Chinesization module and the like; and according to the invention, the vulnerability scanning system and the invasion detection system are combined, the pre-warning function and scheduling function are introduced, thus the system can carry out vulnerability scanning and safety assessment selectively and purposively according to the requirements of users, and a relatively objective and accurate vulnerability scanning report forms.

Description

technical field [0001] The invention relates to a loophole scanning system, in particular to a loophole scanning system oriented to network security assessment and a processing method thereof. Background technique [0002] At present, with the rapid development of computer network and communication technology, network security issues are becoming increasingly prominent. In the face of various network incidents and security issues, we deeply feel the importance and urgency of network security assessment. How to evaluate? What technology is used to implement the security assessment? This has aroused people's widespread attention and attention more and more, and has become a hot issue in the field of information security technology research. [0003] In the face of network security issues, through extensive analysis, it can be found that hackers and viruses usually parasitize and infiltrate into the target system through security holes, and modify and destroy the system to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L12/28H04L29/06
Inventor 刘祥南吴鸿伟高静峰
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products