Vulnerability scanner and plug-in scheduling method thereof

A vulnerability scanner and scheduling method technology, applied in the field of vulnerability scanning, can solve the problems of long loading time, increased hardware cost, slow scanning speed, etc., to achieve the effect of improving scanning speed, reducing hardware cost, and reducing the demand for memory capacity

Active Publication Date: 2012-11-14
NSFOCUS INFORMATION TECHNOLOGY CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous discovery and update of vulnerabilities, the number of plug-ins that need to be used will continue to increase. Loading all plug-ins into the memory at one time will take a long time to load, slow down the entire scanning speed, and require more memory capacity, resulting in an increase in hardware cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanner and plug-in scheduling method thereof
  • Vulnerability scanner and plug-in scheduling method thereof
  • Vulnerability scanner and plug-in scheduling method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 It is a flowchart of an embodiment of a plug-in scheduling method for a vulnerability scanner according to the present invention. As shown in the figure, the method includes the following steps:

[0023] Step 100, after the vulnerability scanner is started, the preset universal plug-in is loaded into the memory.

[0024] Wherein, the general-purpose plug-in refers to a plug-in whose scheduling rate is greater than a preset threshold, and the scheduling rate is a ratio obtained after statistics of a large amount of historical experience data of various operating systems, and is used as an attribute parameter of each plug-in to indicate that the How often the plug-in is called when performing a vulnerability scan. For example, if a plug-in's dispatch rate is greater than a preset threshold, it indicates that the plug-in is very likely to be called, so it should be loaded into memory.

[0025] Statistical process about the scheduling rate, such as figure 2 sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability scanner and a plug-in scheduling method thereof. The plug-in scheduling method includes: loading a preset general plug-in into an internal memory after the vulnerability scanner is started up; recognizing the category of an operation system of a target device after receiving the vulnerability scanning task; selecting a preset scanning template according to the category of the operation system; and invoking plugs-in recorded in the selected scanning template. According to the plug-in scheduling method, the general plug-in is invoked first, the category of the operation system of the target device is then recognized, and the corresponding plugs-in are loaded into the internal memory for invoking. Compared with the mode of loading all plugs-in into the internal memory in one time in the prior art, the plug-in scheduling method shortens loading time, accordingly improves scanning speed, reduces requirements for capacity of the internal memory, and accordingly is favorable for reducing hardware cost.

Description

technical field [0001] The invention relates to a vulnerability scanner and a plug-in scheduling method thereof, belonging to the technical field of vulnerability scanning. Background technique [0002] A vulnerability scanner is a program that automatically detects security weaknesses on remote or local hosts. According to the existing operating mechanism, during the startup process of the vulnerability scanner, all the plug-ins it supports should be loaded into the memory at one time, and then these plug-ins are scheduled according to the needs, so that these plug-ins can scan the corresponding vulnerabilities during the running process . However, with the continuous discovery and update of vulnerabilities, the number of plug-ins that need to be used will continue to increase. Loading all plug-ins into the memory at one time will take a long time to load, slow down the entire scanning speed, and require more memory Capacity, resulting in an increase in hardware costs. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 李振环郭大兴王琰
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products