Distributed host vulnerability scanning method

A vulnerability scanning and main scanning technology, which is applied in the field of distributed host vulnerability scanning, can solve the problems of inability to find vulnerabilities in time and low efficiency of vulnerability scanning, and achieve the effects of saving communication time, highlighting scanning efficiency, and improving efficiency

Active Publication Date: 2015-08-05
SHANGHAI CTRIP COMMERCE CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a distributed host vulnerability scanning method capable of timely and accurately discovering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed host vulnerability scanning method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] The present invention is further illustrated below by means of examples, but the present invention is not limited to the scope of the examples.

[0030] A distributed host vulnerability scanning method, such as figure 1 shown, including the following steps:

[0031] Step 101, establishing a data table corresponding to the IP address of the host to be scanned and the geographic location;

[0032] Step 102, configure geographic location information and authentication information of multiple scanners, configure one of the scanners as a master scanner, and configure the rest of the scanners as slave scanners;

[0033] Step 103, sequentially query the geographic locations corresponding to the IP addresses of all hosts to be scanned in the data table;

[0034] Step 104, creating multiple scanning tasks in the main scanner, and assigning the IP addresses of hosts to be scanned corresponding to the same geographic location to the same scanning task;

[0035] Step 105, judgin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed host vulnerability scanning method, comprising: establishing an IP address of a host and a data table corresponding to geographic positions; configuring geographic position information of a plurality of scanners, and configuring one of the scanners as a main scanner and others as slave scanners; inquiring the geographic position corresponding to the IP address of a to-be-scanned host in the data table; the main scanner creating a plurality of scanning tasks, and distributing the IP address of the to-be-scanned host, corresponding to the same geographic position, to a same scanning task; the main scanner distributing the scanning tasks corresponding to each geographic position to the scanner on the geographic position; and each scanner respectively performing vulnerability scanning on the to-be-scanned host which is corresponding to the IP address in the scanning tasks. Through using a distributed technology, and according to the geographic position of the host, distributing the scanning tasks to the scanner on the same geographic position, an accurate vulnerability scanning report can be obtained in time, thereby improving host vulnerability scanning efficiency.

Description

technical field [0001] The invention relates to the field of network security, in particular to a distributed host vulnerability scanning method. Background technique [0002] Vulnerability scanning refers to a security detection behavior that detects the security vulnerabilities of a specified remote or local computer system through scanning and other means based on the vulnerability database, and finds exploitable vulnerabilities. Vulnerability scanning technology is an important class of network security technology. It cooperates with the firewall and the intrusion detection system to effectively improve the security of the network. By scanning the network, network administrators can understand the security settings of the network and the running application services, discover security vulnerabilities in time, and objectively evaluate the network risk level. Network administrators can correct network security vulnerabilities and wrong settings in the system according to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L12/24
CPCH04L41/28H04L63/0218H04L63/0869H04L63/10H04L63/1433H04L63/20
Inventor 雷兵陈宏田国华韩宝泽
Owner SHANGHAI CTRIP COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products