Unlock instant, AI-driven research and patent intelligence for your innovation.

Scheduling method and scheduling system of vulnerability scanning tool

A vulnerability scanning and scheduling method technology, applied in the field of information security, can solve the problems of queuing and execution of vulnerability scanning tasks, long vulnerability scanning time, and heavy vulnerability scanning workload, so as to improve vulnerability scanning time, avoid overload work, and improve vulnerability The effect of scan speed

Active Publication Date: 2018-06-26
CHINA MOBILE GRP GUANGDONG CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An embodiment of the present invention provides a scheduling method and a scheduling system for a vulnerability scanning tool to solve the problem in the prior art that the vulnerability scanning tasks corresponding to the vulnerability scanning tool are easily queued for execution during the scheduling process of the vulnerability scanning tool, resulting in Serious waste of resources, and problems such as a large workload of vulnerability scanning and a long time of vulnerability scanning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method and scheduling system of vulnerability scanning tool
  • Scheduling method and scheduling system of vulnerability scanning tool
  • Scheduling method and scheduling system of vulnerability scanning tool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0051] In the scheduling method of the vulnerability scanning tool provided in this embodiment, the vulnerability scanning platform can be constructed through the configuration relationship among the vulnerability scanning device, the device to be scanned, and the vulnerability type to create and assign scanning tasks. In order to ensure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vulnerability scanning tool scheduling method and system. The vulnerability scanning tool scheduling method comprises the steps that a vulnerability scanning task is created, wherein the vulnerability scanning task comprises vulnerability scanning subtasks corresponding to the equipment type; resource consumption data of each vulnerability scanning tool are obtained; according to the vulnerability scanning subtasks and the resource consumption data, the vulnerability scanning tools are scheduled in a balanced mode to scan equipment to be scanned. By the adoption of the vulnerability scanning tool scheduling method, according to the obtained resource consumption data, the vulnerability scanning tools are scheduled to carry out multi-thread scanning on the equipment to be scanned, the load of the same vulnerability scanning tool is prevented from being increased, the vulnerability scanning speed of the vulnerability scanning tools is effectively increased, and the vulnerability scanning time of the vulnerability scanning tools is effectively shortened.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a scheduling method of a vulnerability scanning tool and a scheduling system thereof. Background technique [0002] Vulnerability scanning technology is an important network security technology. Since system platforms, WEB sites and / or devices (hereinafter referred to as devices) may have various types of vulnerabilities during use, in order to ensure the security of devices, It is necessary to scan the device for vulnerabilities through a vulnerability scanning tool corresponding to the type of the generated vulnerabilities, and then take relevant remedial measures for the scanned vulnerabilities, such as patching the vulnerabilities. [0003] In the existing technology, in order to cope with the increasingly complex information security situation, enterprises generally need to purchase different types of vulnerability scanning tools from different manufacturers. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F9/50
Inventor 韩杰张斌张征杨丑雄张敬宇王健关闯生高峰张建军苏砫
Owner CHINA MOBILE GRP GUANGDONG CO LTD