Large-scale website vulnerability scanning method and device and electronic equipment

A website vulnerability and vulnerability scanning technology, applied in the field of information security, can solve problems such as troublesome engine cluster expansion, waste of resources, and heavy workload of manual operation and maintenance.

Active Publication Date: 2018-06-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the existing large-scale website vulnerability scanning has the following problems: engin...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large-scale website vulnerability scanning method and device and electronic equipment
  • Large-scale website vulnerability scanning method and device and electronic equipment
  • Large-scale website vulnerability scanning method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The embodiment of the present invention provides a large-scale website vulnerability scanning method, which is applied to physical machines or virtual machines, see figure 1 As shown, the large-scale website vulnerability scanning method includes the following steps:

[0053] S101: Create an image file for containerized vulnerability scanning.

[0054] Before performing vulnerability scanning on the website, the existing vulnerability scanning engine needs to be containerized first. To realize the containerization of the vulnerability scanning engine, an image file for containerized vulnerability scanning needs to be created. The specific image file creation process includes the following steps, see figure 2 Shown:

[0055] S201: Obtain a base image file.

[0056] The above-mentioned basic image file can adopt various versions of CentOS. As a preferred implementation mode, the basic image file in this embodiment is CentOS7.2.

[0057] S202: Install the pre-written ...

Embodiment 2

[0079] An embodiment of the present invention provides a large-scale website vulnerability scanning device, which is applied to a physical machine or a virtual machine, see Figure 5 As shown, the device includes: an image creation module 51 , an image distribution module 52 , and a vulnerability scanning module 53 .

[0080] Wherein, the image creation module 51 is used to create an image file for containerized vulnerability scanning; the image release module 52 releases the created image file to the local image library based on the user's issuing instruction; the vulnerability scanning module 53 is used for When the physical machine or virtual machine obtains the vulnerability scanning instruction, the containerized management tool is used to call the image file from the image library for containerized deployment; and the website vulnerability scan is performed based on the deployed image file.

[0081] In the large-scale website vulnerability scanning device provided by the...

Embodiment 3

[0083] The embodiment of the present invention also provides an electronic device, see Figure 6 As shown, the electronic device includes: a processor 60, a memory 61, a bus 62 and a communication interface 63, and the processor 60, the communication interface 63 and the memory 61 are connected through the bus 62; the processor 60 is used to execute the data stored in the memory 61 Executable modules, such as computer programs. When the processor executes the computer program, the steps of the methods described in the method embodiments are realized.

[0084] Wherein, the memory 61 may include a high-speed random access memory (RAM, RandomAccessMemory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 63 (which may be wired or wireless), and the Internet, wide area net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a large-scale website vulnerability scanning method and device and electronic equipment, and relates to the technical field of information security. The large-scale website vulnerability scanning method is applied to a physical machine or a virtual machine and comprises the steps that an image file used for containerized vulnerability scanning is built; on the basis of a publishing instruction of a user, the built image file is published into a local image repository; when the physical machine or the virtual machine obtain a vulnerability scanning instruction, an image file is called from the image repository to be subjected to containerized deployment; website vulnerability scanning is conducted on the basis of the deployed image file. According to the method, the image file built in advance is subjected to containerized deployment, and then website vulnerability scanning is conducted through the deployed image file; by means of the containerized deployment mode, one button extension and shrinking engine cluster can be achieved, manual and repetitive work is greatly reduced, and meanwhile the steps of the vulnerability scanning process are optimized, so thatthe resource utilization rate is increased, and the performance is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a large-scale website vulnerability scanning method, device and electronic equipment. Background technique [0002] With the development of Internet technology, there will inevitably be network vulnerabilities in web programs or websites. Hackers often use this network vulnerability to steal corporate confidential information or personal information of Internet users, posing a threat to Internet information security. In view of the above problems, at present, a vulnerability scanning engine is usually used to monitor and repair vulnerabilities, so as to ensure the security of network information. [0003] The current vulnerability scanning engine mostly adopts single-machine or multi-node deployment mode. In this mode, when a large number of websites need to be monitored, the engine nodes need to be expanded, and when the number of tasks is too small, the engine nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 宋建昌范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products