Unlock instant, AI-driven research and patent intelligence for your innovation.

Large-scale website vulnerability scanning method, device and electronic equipment

A website vulnerability and vulnerability scanning technology, applied in the field of information security, can solve the problems of heavy manual operation and maintenance workload, troublesome engine cluster expansion, waste of resources, etc.

Active Publication Date: 2021-01-26
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, the existing large-scale website vulnerability scanning has the following problems: engine cluster expansion is troublesome, manual operation and maintenance workload is heavy; resource waste is serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large-scale website vulnerability scanning method, device and electronic equipment
  • Large-scale website vulnerability scanning method, device and electronic equipment
  • Large-scale website vulnerability scanning method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The embodiment of the present invention provides a large-scale website vulnerability scanning method, which is applied to physical machines or virtual machines, see figure 1 As shown, the large-scale website vulnerability scanning method includes the following steps:

[0053] S101: Create an image file for containerized vulnerability scanning.

[0054] Before performing vulnerability scanning on the website, the existing vulnerability scanning engine needs to be containerized first. To realize the containerization of the vulnerability scanning engine, an image file for containerized vulnerability scanning needs to be created. The specific image file creation process includes the following steps, see figure 2 Shown:

[0055] S201: Obtain a base image file.

[0056] The above-mentioned basic image file can adopt various versions of CentOS. As a preferred implementation mode, the basic image file in this embodiment is CentOS7.2.

[0057] S202: Install the pre-written ...

Embodiment 2

[0079] An embodiment of the present invention provides a large-scale website vulnerability scanning device, which is applied to a physical machine or a virtual machine, see Figure 5 As shown, the device includes: an image creation module 51 , an image distribution module 52 , and a vulnerability scanning module 53 .

[0080] Wherein, the image creation module 51 is used to create an image file for containerized vulnerability scanning; the image release module 52 releases the created image file to the local image library based on the user's issuing instruction; the vulnerability scanning module 53 is used for When the physical machine or virtual machine obtains the vulnerability scanning instruction, the containerized management tool is used to call the image file from the image library for containerized deployment; and the website vulnerability scan is performed based on the deployed image file.

[0081] In the large-scale website vulnerability scanning device provided by the...

Embodiment 3

[0083] The embodiment of the present invention also provides an electronic device, see Image 6 As shown, the electronic device includes: a processor 60, a memory 61, a bus 62 and a communication interface 63, and the processor 60, the communication interface 63 and the memory 61 are connected through the bus 62; the processor 60 is used to execute the data stored in the memory 61 Executable modules, such as computer programs. When the processor executes the computer program, the steps of the methods described in the method embodiments are realized.

[0084] Wherein, the memory 61 may include a high-speed random access memory (RAM, RandomAccessMemory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 63 (which may be wired or wireless), and the Internet, wide area netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a large-scale website vulnerability scanning method, device and electronic equipment, and relates to the field of information security technology. The large-scale website vulnerability scanning method is applied to physical machines or virtual machines, including: creating a mirror image file for containerized vulnerability scanning ;Based on the user's release instructions, publish the created image file to the local image library; when the physical machine or virtual machine obtains the vulnerability scanning instruction, call the image file from the image library for containerized deployment; and based on the deployed image file for website vulnerability scanning. This method deploys pre-created image files in a containerized manner, and then scans website vulnerabilities through the deployed image files. This containerized deployment method can realize one-click expansion and contraction of the engine cluster, greatly reducing manual repetitive labor, and at the same time Optimize the vulnerability scanning process steps to improve resource usage and improve performance.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a large-scale website vulnerability scanning method, device and electronic equipment. Background technique [0002] With the development of Internet technology, there will inevitably be network vulnerabilities in web programs or websites. Hackers often use this network vulnerability to steal corporate confidential information or personal information of Internet users, posing a threat to Internet information security. In view of the above problems, at present, a vulnerability scanning engine is usually used to monitor and repair vulnerabilities, so as to ensure the security of network information. [0003] The current vulnerability scanning engine mostly adopts single-machine or multi-node deployment mode. In this mode, when a large number of websites need to be monitored, the engine nodes need to be expanded, and when the number of tasks is too small, the engine nod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 宋建昌范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD