Distributed type vulnerability scanning and evaluating method

A vulnerability scanning and distributed technology, which is applied in the field of distributed vulnerability scanning and evaluation, can solve problems such as core business interruption, data eavesdropping, and core business system attacks, and achieve the effects of distributed scanning, confidentiality resolution, and performance improvement

Active Publication Date: 2015-09-30
西安交大捷普网络科技有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the security problem of enterprise LAN environment is prominent. Enterprises are facing the pressure of terminal access control brought by internal threats, branches, visitors and mobile office. Professional hackers driven by profit often target enterprise terminals and exploit security loopholes in terminals. Obtain unauthorized access to important resources, and then launch attacks on core business systems, resulting in data eavesdropping or destruction, core business interruption, malicious code, information leakage and other security incidents, resulting in loss of business and reputation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed type vulnerability scanning and evaluating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0013] Embodiments of the present invention provide a distributed vulnerability scanning and evaluation method, such as figure 1 As shown, the method is implemented through the following steps:

[0014] Step 101: the control terminal sends scanning policy and scanning object data to at least one detecting node.

[0015] Specifically, the control terminal sets the legal IP address corresponding to each detection node for unique identification and communication.

[0016] Step 102: The detecting node performs a scanning action according to the received scanning policy and scanning object data and returns scanning data to the control terminal.

[0017] Step 103: The detection node sends state information to the control terminal every state period, and the control terminal determines the state of the detection node according to the time when the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed type vulnerability scanning and evaluating method. According to the method, a control terminal sends scanning strategies and scanning objective data to at least one detection node, each detection node performs scanning actions according to received scanning strategies and scanning objective data and sends back scanning data to the control terminal, state information of each detection node at each period of state is sent to the control terminal, and the control terminal determines the state of each detection node according to the state information receiving time. According to the distributed type vulnerability scanning and evaluating method, the problem that a user is required to get involved in scanning each time is solved, meanwhile, the distributed type scanning is effectively realized, a task is effectively decomposed, the performance is improved, and the problem about secret-associated issues can be solved.

Description

technical field [0001] The invention relates to the field of vulnerability scanning and assessment, in particular to a distributed vulnerability scanning and assessment method. Background technique [0002] At present, the security problem of enterprise LAN environment is prominent. Enterprises are facing the pressure of terminal access control brought by internal threats, branches, visitors and mobile office. Professional hackers driven by profit often target enterprise terminals and exploit security loopholes in terminals. Obtain unauthorized access to important resources, and then launch attacks on core business systems, resulting in data eavesdropping or destruction, core business interruption, malicious code, information leakage and other security incidents, resulting in loss of business and reputation. Contents of the invention [0003] In view of this, the main purpose of the present invention is to provide a distributed vulnerability scanning and assessment method....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/57
CPCG06F21/577H04L63/1433H04L67/10
Inventor 刘亚轩何建锋赵明彰陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products