Check patentability & draft patents in minutes with Patsnap Eureka AI!

Vulnerability scanning cooperation method based on new communication protocol

A vulnerability scanning and communication protocol technology, which is applied in the field of network security, can solve problems such as inability to achieve collaborative work and fail to meet application requirements, achieving efficient collaborative work and improving accuracy

Inactive Publication Date: 2016-04-13
西安交大捷普网络科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in reality, due to the limitations of information resource sharing of various devices, it is impossible to achieve sufficient collaborative work. The current IDS (Intrusion Detection System), IPS (Intrusion Prevention System), NVAS (Vulnerability Scanning System) There is still a gap between the application status and the highly secure enterprise information construction requirements required by the enterprise, and cannot sufficiently meet the application requirements in the real working environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning cooperation method based on new communication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0014] An embodiment of the present invention provides a linkage method for vulnerability scanning based on a new communication protocol, such as figure 1 As shown, the method is implemented through the following steps:

[0015] Step 101: the linkage agent passes the authentication of the linkage server.

[0016] Specifically, the linkage server uses the MD5 algorithm to encrypt the IP address of the linkage agent to generate a 32-bit hexadecimal authentication key; Initiate the verification, and the linkage server responds after receiving the verification request, and if the verification is successful, continue the subsequent process; otherwise, end the current process.

[0017] The linkage server stores the IP address of the linkage agent and the authentication key together in the sqlite database of the linkage server, and saves the authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability scanning cooperation method based on a new communication protocol, comprising that: firstly, a cooperation agent passes through the authentication of a cooperation server; then the cooperation server scans the host assigned by the cooperation agent in the scanning request according to a received scanning request of the cooperation agent; and finally, the cooperation server sends related parameter information in the scanning process and the security information report forms generated after scanning to the cooperation agent. In application of the vulnerability scanning cooperation realization method based on the cooperation communication protocol of the invention, an IPS (intrusion prevention system), an IDS (intrusion detection system), an information auditing system and an NVAS (network vulnerability scanning system) can realize cooperative work in high efficiency, the attack preventing accuracy of the intrusion detection system is effectively promoted, and the confidentiality and completeness of the information auditing system and the intrusion detection system are ensured.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a linkage method of vulnerability scanning based on a new communication protocol. Background technique [0002] With the deepening of enterprise informatization, computer network plays an increasingly important role in the enterprise. However, due to the typical interconnection and openness of the Internet, the internal computer network system of an enterprise is extremely easy to become the target and carrier of malicious attacks. How to better protect the computer network security within the enterprise is also being valued by more and more enterprises. For this reason, many traditional network security equipment developers have successively released a series of network security products. However, in reality, due to the limitations of information resource sharing of various devices, it is impossible to achieve sufficient collaborative work. The current IDS ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/0876H04L63/0884H04L63/1433H04L63/1466
Inventor 王志达赵明彰陈宏伟
Owner 西安交大捷普网络科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More