Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning method and device

A vulnerability scanning and vulnerability technology, applied in the field of network security, can solve problems such as system catastrophe and security threats, and achieve the effect of improving the efficiency of vulnerability discovery

Pending Publication Date: 2017-07-21
BEIJING KUANGEN NETWORK TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the connection between the industrial control network and the Internet, the security risks of the industrial control network have gradually been exposed.
The traditional industrial control network uses physical isolation to protect its security. Once it is connected to the Internet, it will face unavoidable security threats, and because most of the industrial control network controls industries, transportation, and electric energy that are closely related to the people infrastructure, which is more closely connected to the real world, so the failure of the system has the potential to have catastrophic consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0060] The specific implementation manners of a vulnerability scanning method and device provided in the present disclosure will be described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0061]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vulnerability scanning method and device. The method comprises a step of judging whether equipment to be scanned corresponding to an IP address to be scanned has an open port for the IP address to be scanned, a step of storing the open port and the corresponding IP address to be scanned into a message queue when a condition that the equipment to be scanned has the open port is determined, a step of obtaining the open port and the corresponding IP address to be scanned from the message queue, and a step of carrying out vulnerability scanning on the equipment to be scanned corresponding to an IP address to be scanned so as to determine the vulnerability information of the open port of the equipment to be scanned. Through the vulnerability scanning method and device, by using a message queue mechanism, the vulnerability discovery efficiency of online equipment corresponding to massive IP addresses is improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, in particular to a vulnerability scanning method and device. Background technique [0002] With the advent of the Industrial Internet of Things, the gradual deepening and implementation of smart manufacturing, Industry 4.0, and the Made in China 2025 strategy, the traditional industrial control network is gradually interconnected with the Internet, in order to obtain comprehensive solutions in manufacturing, logistics, warehousing, and user customization. power enhanced. However, with the connection between the industrial control network and the Internet, the security risks of the industrial control network have gradually been exposed. The traditional industrial control network uses physical isolation to protect its security. Once it is connected to the Internet, it will face unavoidable security threats, and because most of the industrial control network controls industries, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 李飞黄辉赵舟平
Owner BEIJING KUANGEN NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products