Vulnerability scanning method based on movable agent

A vulnerability scanning and mobile agent technology, applied in the field of information security, to achieve the effect of easy expansion

Active Publication Date: 2013-07-10
BANK OF BEIJING CONSUMER FINANCE CO
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Examining the existing vulnerability testing tools, each has its own strengths in cross-platform, scalability, execution efficiency, classification of vulnerability results, analysis, etc., but none of them can combine these advantages. In order to be able to combine all advantages, And make a reasonable classification of the vulnerability scanning results, which is suitable for regular processing and used for system evaluation. It is necessary to propose a vulnerability scanning method based on mobile agents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method based on movable agent
  • Vulnerability scanning method based on movable agent
  • Vulnerability scanning method based on movable agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] The present invention is used as an automated information system security assessment tool, such as figure 1 As shown, its entire architecture includes a user configuration module, a management agent module, a roaming agent module, a vulnerability database module and a result processing module, where the management agent module is the command and control layer in the hierarchical architecture, and the management agent module generates roam After proxying, it is sent to the network, and the roaming proxy is cyclically migrating among all scanning hosts in the network to collect the running status of each scanning sub-agent module.

[0020] The present invention adopts the Agent Tcl system of Dartmouth University as the mobile agent environment. Agent Tcl system not only provides mobile agent mechanism, but als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability scanning method based on a movable agent and belongs to the technical filed of information safety. The vulnerability scanning method based on the movable agent includes that a user sets scanning parameters through a configuration module and triggers a roaming agent module to send out roaming agent through a management agent module, the management agent module transmits a needed vulnerability feature base from a vulnerability base module through an encryption transmission mechanism, the roaming agent moves in circulation among hosts which need to be scanned in the network and collects a running state of each scanning sub-agent module, scanning results are transmitted to the management agent module through the encryption transmission mechanism after each scanning sub-agent module completes scanning, and the management agent module triggers a result disposing module to conduct unified classification and sorting of the vulnerability scanning results. The vulnerability scanning method based on the movable agent helps and guides evaluation personnel to complete assessment to a computer information system and can conduct automatic comprehensive analysis and processing to each assessment record, and objectivity and accuracy of evaluation results are ensured.

Description

technical field [0001] The invention relates to a vulnerability scanning method, in particular to a vulnerability scanning method based on a mobile agent, and belongs to the technical field of information security. Background technique [0002] Traditional system evaluation requires evaluators to conduct a comprehensive investigation and test on all aspects of the computer information system, and conduct comprehensive analysis on the results of the investigation and test, and finally obtain the comprehensive security performance of the entire system. This requires evaluators not only to have profound computer information system and network knowledge and technical ability, but also to have rich evaluation experience. Even so, the final comprehensive evaluation result is also drawn by the evaluators, which inevitably brings in the subjective judgment of the evaluators. To some extent, it affects the objectivity of the evaluation results. In addition, due to the recent start ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 李千目陈强富汪欢印杰施丛丛侯君
Owner BANK OF BEIJING CONSUMER FINANCE CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products