Method and device for scanning plug-in and determining rule scheduling sequence in plug-in

A scheduling sequence and rule technology, applied in the field of Internet security, can solve the problems of low overall scanning performance of vulnerability scanners, waste of time and computer resources, and reduce scanning speed and efficiency, so as to improve the overall scanning performance, improve scanning speed and efficiency , the effect of saving computer resources

Active Publication Date: 2017-05-17
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a method and device for plug-in scanning and determining the scheduling order of rules in the plug-in, which is used to solve the problem that the vulnerability scanner in the prior art usually randomly selects the rule conditions in the plug-in or manually adjusts the rule conditions when scanning vulnerabilities. , so it has great randomness and uncertainty. When scanning multiple unknown scanning targets, a lot of time and computer resources are wasted due to improper internal rule scheduling sequence of each plug-in, which reduces scanning speed and low efficiency. , an issue that caused the overall scan performance of the Vulnerability Scanner to be low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
  • Method and device for scanning plug-in and determining rule scheduling sequence in plug-in
  • Method and device for scanning plug-in and determining rule scheduling sequence in plug-in

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] An embodiment of the present invention provides a vulnerability scanning system, such as figure 1 As shown, it is a schematic structural diagram of a vulnerability scanning system provided by an embodiment of the present invention, including: a plug-in rule scheduling module 101 , a statistical analysis module 102 , and a database 103 . Wherein, the database 103 includes a rule base 1031 , a plug-in base 1032 , and a vulnerability b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for scanning a plug-in and determining the rule scheduling sequence in the plug-in. The method includes: during the determining stage of the rule scheduling sequence in the plug-in, determining the resource consumption of each independent rule in rule channels and the hit rate of loophole scanning of the rule channels; determining the scheduling sequence of each rule channel according to the resource consumption and the hit rate; during a scanning stage, sequentially performing loophole scanning according to the scheduling sequence of each rule channel. The method has the advantages that the plug-in is granulated according to the independent rules, the minimum unit of scanning scheduling is granulated into the rule channels, the reasonable rule channel scheduling sequence is determined automatically, plug-in scanning speed and efficiency are increased, computer resources are saved at the same time, and the overall scanning performance of a loophole scanner is increased.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method and device for scanning plug-ins and determining the scheduling order of rules in the plug-ins. Background technique [0002] With the increasing development of network technology, network security has become a hot spot. A vulnerability scanner is a program that automatically detects security weaknesses on remote or local hosts. According to the existing operating mechanism, the vulnerability scanner needs to load the supported plug-ins into the memory during startup, and then schedule these plug-ins as required, so that these plug-ins can scan corresponding vulnerabilities during the running process. [0003] In the prior art, the smallest unit of vulnerability scanner scheduling is a plug-in. For a plug-in, there may be many rules and conditions for scanning whether a vulnerability exists, ranging from a few to dozens of rules. When scanning plug-ins, the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/0263H04L63/1433
Inventor 张楠吴昊刘洋古琳莹
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products