Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security vulnerability scanning system and method

A vulnerability scanning and network security technology, which is applied in the field of network security vulnerability scanning system, can solve problems such as failure to scan out vulnerability risks, and achieve the effect of avoiding missed scans

Inactive Publication Date: 2017-10-24
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: to propose a network security vulnerability scanning system and method to solve the problem that the traditional vulnerability scanning technology cannot scan out the risks caused by vulnerabilities when the service port is changed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security vulnerability scanning system and method
  • Network security vulnerability scanning system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The invention aims to provide a network security vulnerability scanning system and method, which solves the problem that the traditional vulnerability scanning technology cannot scan out the risks brought by the vulnerability when the service port is changed.

[0033] Below in conjunction with accompanying drawing, the scheme of the present invention is further described:

[0034] like figure 1 As shown, the network security vulnerability scanning system in the present invention includes:

[0035] The port scanning module is used to call the port scanning tool to scan the network port;

[0036] The information extraction module is used to extract the port and the corresponding service fingerprint information in the returned data;

[0037] The splicing module is used to splicing the ip address and the service port;

[0038] The service vulnerability scanning module is used to call the related service vulnerability scanning plug-in to perform vulnerability scanning on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to network security technology and discloses a network security vulnerability scanning system and method to solve a problem that risks caused by vulnerability can not be scanned when a service port changes in vulnerability scanning technology in prior art. The network security vulnerability scanning system comprises a port scanning module used for invoking a port scanning tool to scan network ports, an information extraction module used for extracting ports and corresponding service fingerprint information in returned data, a jointing module used for jointing ip addresses and service ports, and a service vulnerability scanning module used for invoking relative service vulnerability scanning plug-ins to scan vulnerability of port service. The system and method are suitable for network security vulnerability detection.

Description

technical field [0001] The invention relates to network security technology, in particular to a network security vulnerability scanning system and method. Background technique [0002] Existing vulnerability scanning technologies, especially in the direction of host vulnerability scanning, have always used traditional default port scanning. The traditional scanning method still has a certain effect, but if the operation and maintenance personnel change the port that the service goes through through the operation and maintenance method, the traditional vulnerability scanning mode will not be able to find the vulnerability, but for manual security penetration, the change of the port cannot prevent it. , and can not achieve the effect of security defense. [0003] Therefore, it is necessary for the present application to provide a network security vulnerability scanning system and method, which can still scan for network security vulnerabilities when the service port is change...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 吴思宏
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products