Vulnerability scanning method and system

A vulnerability scanning and vulnerability technology, which is applied in the field of vulnerability scanning methods and systems, can solve the problems of low correlation of missed scanning results, inability to integrate analysis and evaluation of missing scanning results of vulnerability scanning products, etc.

Active Publication Date: 2017-10-10
ULTRAPOWER SOFTWARE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, webpage vulnerability scanning technology and vulnerability scanning technology for various application systems and network environments have developed vigorously. Many manufacturers and brands of vulnerability scanning service products have appeared on the market. scanned objects), but it also caused a major problem: the results of various heterogeneous system vulnerability scanning products cannot be integrated, analyzed and evaluated, and thus cannot give users a comprehensive and valuable conclusion report , cannot guide users to realize the security maintenance work in the whole application field
[0007] Existing reports on missed scan service results of heterogeneous systems do not carry out in-depth processing of each missed scan result, and the correlation between missed scan results is small or even non-correlative, and it is impossible to achieve a unified and standardized evaluation of missed scan results , so it is impossible to form a final guiding significance, which makes it very difficult to compare and cannot achieve the purpose of guiding users' security maintenance work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and system
  • Vulnerability scanning method and system
  • Vulnerability scanning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0060] The technical problem to be solved by the embodiments of the present invention is: in order to solve the problem that the missed scan results of various heterogeneous system vulnerability scan products cannot be integrated, analyzed and evaluated, resulting in a lack of guiding significance for actual security maintenance work.

[0061]The overall idea of ​​the embodiment of the present invention: select the corresponding vulnerability scanning product (vulnerability scanning mode) based on the heterogeneous system and automatically order the missed scanning task; The missed scan results after execution; integrate and quantify the missed scan results of heterogeneous systems, analyze and evaluate the missed scan problems through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability scanning method and system and relates to the technical field of computer network information security. Vulnerability scanning service results for heterogeneous systems are integrated according to uniform standards so as to integrate and standardize vulnerability scanning results; various sources and security problems are quantitatively handled so as to compare the vulnerability scanning conditions of the heterogeneous systems under the uniform standards; security index for various assets is acquired by computation so that security maintenance is further guided. On the whole, the vulnerability scanning method and system according to the embodiment has the advantages that assessment of uniform standard vulnerability scanning results is achieved, vulnerability scanning reports having guidance significance, based on high relevancy of heterogeneous system vulnerability scanning services and allowing assessment in accordance with the uniform standards are finally formed, and security maintenance is guided for users.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a vulnerability scanning method and system. Background technique [0002] In recent years, webpage vulnerability scanning technology and vulnerability scanning technology for various application systems and network environments have developed vigorously. Many manufacturers and brands of vulnerability scanning service products have appeared on the market. Scanned object), but it also caused a major problem: the missed scan results of various heterogeneous system vulnerability scanning products cannot be integrated, analyzed and evaluated, and thus cannot give users a comprehensive and valuable conclusion report , cannot guide users to realize the security maintenance work in the whole application field. [0003] The basic implementation steps of the existing analysis method for vulnerability scanning service results are as follows: [0004] 1. Facin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F17/30
CPCG06F21/577
Inventor 杨丑雄张建军苏砫王明漪
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products