Security Vulnerability Scanning System in Cloud Network Environment
A vulnerability scanning and cloud network technology, applied in the transmission system, electrical components, etc., can solve the problem of unreachable vulnerability scanning equipment and achieve the effect of ensuring connectivity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The present invention will be further described below in conjunction with the accompanying drawings.
[0015] Such as figure 1 As shown, the security vulnerability scanning system of the present invention includes multiple virtual local area networks 1 , scanning engine virtual machines 3 and management hosts 4 . Specifically, the virtual local area networks 1 are interconnected through the virtual router 2, the scanning engine virtual machine 3 can be used to scan the target host in the virtual local area network 1 that needs to be scanned, and the management host 4 can communicate with the scanning engine virtual machine 3 The interconnection is carried out, so that the management host 4 can start the security vulnerability scanning of the scanning engine virtual machine 3, receive the scanning result returned by the scanning engine virtual machine 3, and perform unified management on the scanning result.
[0016] Therefore, by using the scanning engine virtual machi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

