Method and device for assigning large-scale vulnerability scanning task

A vulnerability scanning and scanning task technology, applied in the Internet field, can solve the problems of different time required for vulnerability scanning, poor rationality, and slow execution of scanning tasks by nodes, so as to improve the rationality and the efficiency of vulnerability scanning.

Active Publication Date: 2014-06-18
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The number of virtual nodes performing scanning tasks is directly affected by the experience of the inspectors. On the one hand, the professional requirements of the inspectors are high, and on the other hand, the accuracy of the number of nodes determined by the subjective judgment of the inspectors is also low;
[0006] 2. Although the number of target hosts assigned to each node is the same, the time required for vulnerability scanning for each host is also different, which makes the rationality of this task allocation method poor;
[0007] 3. The relationship between vulnerabilities is not considered when assigning tasks. Each node can only scan for vulnerabilities after loading all the plug-ins in the scanning task, which makes the node perform scanning tasks slowly and reduces the efficiency of vulnerability scanning.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for assigning large-scale vulnerability scanning task
  • Method and device for assigning large-scale vulnerability scanning task
  • Method and device for assigning large-scale vulnerability scanning task

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In order to enable those skilled in the art to better understand the solution of the present invention, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and implementation manners.

[0085] In order to realize the reasonable distribution of scanning tasks and improve the scanning efficiency, it can generally be realized through the mutual cooperation of static allocation and dynamic scheduling. For static allocation, it refers to assigning tasks to each virtual node as reasonably as possible before the task is officially executed, so as to achieve a reasonable allocation of initial resources, so that the task can achieve load balance to the greatest extent during the execution process. The task allocation method in the embodiment of the present invention is a static task allocation method, and the allocation process will be explained below.

[0086] Such as figure 1 As shown, the flow chart...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for assigning a large-scale vulnerability scanning task. The method comprises the following steps: receiving a scanning task issued by a cloud platform, wherein the scanning task comprises the identity set of target hosts, the identity set of a plug-in and a corresponding relation of the plug-in and vulnerability; partitioning the scanning task into at least two sub-tasks according to the corresponding relation of the plug-in and vulnerability; determining the number of virtual nodes according to the number of partitioned sub-tasks; assigning target hosts corresponding to each sub-task to each virtual node on average in sequence. By adopting the technical scheme of the invention, the scanning task assigning rationality and the vulnerability scanning efficiency are increased.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for task assignment of large-scale vulnerability scanning. Background technique [0002] Cloud computing is the core technology of a next-generation computing platform that can provide dynamic resource pools, virtualization, and high availability. The services provided by cloud computing are oriented to a large number of user groups, and the system must process massive tasks all the time. Therefore, the efficiency of resource allocation has a great impact on the overall system performance of the cloud computing platform. Key points and difficulties in computing. [0003] With the increasing development of network technology, network security issues have become a focus of attention. Large-scale vulnerability scanning for this issue is a typical application of cloud computing. Among them, the virtual nodes for vulnerability scanning constitute the resource pool of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/50G06F9/455H04L29/08
Inventor 章新斌何申
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products