Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Vulnerability Scanning System in Cloud Network Environment

A vulnerability scanning and cloud network technology, applied in the transmission system, electrical components, etc., can solve the problem of unreachable vulnerability scanning equipment and achieve the effect of ensuring connectivity

Active Publication Date: 2017-04-26
新疆中科曙光云计算有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, for the virtual network in the cloud network environment, traditional vulnerability scanning equipment is not reachable, which will form a blind spot for network security detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Vulnerability Scanning System in Cloud Network Environment
  • Security Vulnerability Scanning System in Cloud Network Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described below in conjunction with the accompanying drawings.

[0015] Such as figure 1 As shown, the security vulnerability scanning system of the present invention includes multiple virtual local area networks 1 , scanning engine virtual machines 3 and management hosts 4 . Specifically, the virtual local area networks 1 are interconnected through the virtual router 2, the scanning engine virtual machine 3 can be used to scan the target host in the virtual local area network 1 that needs to be scanned, and the management host 4 can communicate with the scanning engine virtual machine 3 The interconnection is carried out, so that the management host 4 can start the security vulnerability scanning of the scanning engine virtual machine 3, receive the scanning result returned by the scanning engine virtual machine 3, and perform unified management on the scanning result.

[0016] Therefore, by using the scanning engine virtual machi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security flaw scanning system under a cloud network environment. The security flaw scanning system under the cloud network environment comprises multiple virtual local area networks (1), a scanning engine virtual machine (3) and a management host computer (4). The virtual local area networks (1) are connected with one another through virtual routers (2), the scanning engine virtual machine (3) is used for carrying out security flaw scanning on target hosts in the virtual local area networks (1), and the management host computer (4) is used for starting the security flaw scanning of the scanning engine virtual machine (3), receiving scanning results fed back by the scanning engine virtual machine (3), and carrying out unified management over the scanning results. The security flaw scanning system under the cloud network environment can carry out the flaw scanning under virtual networks by using the scanning engine virtual machine, and therefore the connectivity of the flaw scanning in the virtual networks can be guaranteed.

Description

technical field [0001] The invention relates to a security loophole scanning system in a cloud network environment. Background technique [0002] At present, traditional vulnerability scanning tools support physical networks very well, but for the complexity of virtual networks, traditional vulnerability scanning devices cannot maintain effective connectivity, which affects the traditional vulnerability scanning tools in the cloud computing environment to a certain extent. usage of. [0003] In the cloud computing environment, because the network is in a virtual state, it can be customized and dynamically changed according to user needs, but it is difficult for traditional scanning tools to adapt to such changes. In addition, traditional vulnerability scanning devices cannot reach the virtual network in the cloud network environment, which will form a blind spot for network security detection. [0004] Aiming at the problems in the related technologies, no effective soluti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 郑勇王军林唐明徐博
Owner 新疆中科曙光云计算有限公司