Vulnerability detection method and device

A vulnerability detection and vulnerability technology, applied in the Internet field, can solve problems such as the inability to meet the scanning requirements and the inability to scan vulnerabilities.

Active Publication Date: 2017-01-25
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the existing scanning method is applied to this new type of cloud host management platform for vulnerability scanning, only the management interface of the cloud platform can be scanned, and the loopholes that may exist in the netw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0022] In order to solve the problem that the existing vulnerability scanning method cannot meet the scanning requirements in the cloud environment, the embodiment of the present invention provides a vulnerability detection method, such as figure 1 As shown, the method includes:

[0023] 101. The scanning virtual machine scans the network interaction between functional components in the cloud environment.

[0024] The scanning vir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device, which relate to the technical field of internet, and are invented for solving the problem that an existing vulnerability scanning method cannot meet the scanning requirement under a cloud environment. The method provided by the invention comprises the steps of scanning network interaction between each two functional units in the cloud environment through a scanning virtual machine, wherein the scanning virtual machine is located in the cloud environment; receiving scanning result data returned by each functional unit; comparing the scanning result data with a preset vulnerability triggering condition and determining the safety of the network interaction. The vulnerability detection method and device provided by the invention are applied in a process of performing vulnerability scanning on the network interaction between the different functional units in the cloud environment.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a loophole detection method and device. Background technique [0002] With the rapid development of Internet technology and the demand for big data, a new Internet technology cloud technology has emerged. Cloud technology is the development of distributed processing, parallel processing and network computing. It refers to a hosting technology that unifies a series of resources such as hardware, software and network in a wide area network or a local area network to realize data calculation, storage and sharing. [0003] The hosting platform corresponding to cloud technology is called cloud platform or cloud environment. The hosts in the cloud environment are all virtual machines, and different virtual machines are managed through a cloud host management platform. The existing commonly used cloud host management platforms are Openstack, Close stack, etc. Network communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1433H04L67/10
Inventor 汪圣平
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products