Vulnerability scanner and plug-in scheduling method thereof

A vulnerability scanner and vulnerability scanning technology, applied in the field of network security, can solve the problems of slow scanning speed, taking up a lot of time and memory capacity, and unable to meet the growth rate of plug-ins, so as to improve the scanning speed and save memory space.

Inactive Publication Date: 2018-04-20
西安交大捷普网络科技有限公司
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the technical problem in the prior art that loading many plug-ins into the memory at one time will take up a lot of time and memory capacity, and the hardware configuration may not be a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanner and plug-in scheduling method thereof
  • Vulnerability scanner and plug-in scheduling method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and embodiments of the present invention. The following embodiments are only preferred embodiments of the present invention, not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0030] The present invention provides a vulnerability scanning plug-in scheduling method, such as figure 1 , specifically through the following steps:

[0031] After starting the vulnerability scanner and receiving the vulnerability scanning task, identify whether the target to be scanned is a host or a network security device; use the nmap tool to detect the target to be scanned, and if the target to be scanned is a host, simultaneously detect the operating system and deployed services of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network security, in particular to a vulnerability scanner and a plug-in scheduling method thereof. The method comprises the following steps that: starting the vulnerability scanner, and identifying whether a target to be scanned is a host or network security equipment after a vulnerability scanning task is received; if the target to be scanned is the host, detecting the operating system of the host and a deployed service type, and selecting a preset scanning module according to the operating system and the service type; and if the target to be scanned isthe network security equipment, detecting the system type and the equipment type of the network security equipment, selecting a preset scanning module, and calling a plug-in recorded in the selected scanning module. The invention also discloses a scanner. On the basis of the above operating system type of the host, the service type or the operating system type and the equipment type of the networkequipment, the corresponding plug-in module can be selected and called, then, the corresponding plug-in is loaded into memory, and finally, the plug-in in the memory is read to be executed. Therefore, memory space is saved, and scanning speed is quickened.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a vulnerability scanner and a plug-in scheduling method thereof. Background technique [0002] With the deepening of enterprise informatization, computer network plays an increasingly important role in the enterprise. However, due to the typical interconnection and openness of the Internet, the internal computer network system of an enterprise is extremely easy to become the target and carrier of malicious attacks. How to better protect the computer network security within the enterprise is also being valued by more and more enterprises. [0003] Network vulnerability scanning plays an increasingly important role in ensuring network security. With the help of network vulnerability scanning, people can find open ports, services provided, certain system information, wrong configurations, known security vulnerabilities, etc. in the network and hosts. In the face of Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F9/445G06F9/50
CPCG06F9/44526G06F9/5016G06F21/577
Inventor 王志达葛大伟何建锋程效波
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products