A port vulnerability detection method, terminal and computer readable medium

A vulnerability detection and port technology, applied in the communication field, can solve problems such as time-consuming, complicated, and low scanning efficiency, and achieve the effect of improving the efficiency of vulnerability detection

Active Publication Date: 2021-06-29
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of computer network technology, Internet security issues are becoming more and more complex. At present, the loopholes for the Internet are mainly determined by scanning the loopholes of all data information on the network to determine whether there are loopholes in the data information. However, through this Vulnerability scanning in this way will consume a lot of time, reduce scanning efficiency, and at the same time cause certain pressure on the business system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A port vulnerability detection method, terminal and computer readable medium
  • A port vulnerability detection method, terminal and computer readable medium
  • A port vulnerability detection method, terminal and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates otherwise.

[0044] It should also be further understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a port vulnerability detection method, a terminal, and a computer-readable medium. The method includes: obtaining an IP address to be detected, and detecting the port information of each port corresponding to the IP address; If there is a first port whose port information changes in each port corresponding to the IP address, then call the preset vulnerability scanning engine to detect the vulnerability of the first port; if it is detected that in each port corresponding to the IP address There is a second port whose port information has not changed, then obtain port service information in the second port; detect the port service information in the second port; if it is detected that the port service information has changed , the preset vulnerability scanning engine is invoked to detect the vulnerability of the second port, which realizes the vulnerability detection of the port whose port information changes, and improves the efficiency of vulnerability detection.

Description

technical field [0001] The invention relates to the technical field of communications, and in particular to a port vulnerability detection method, a terminal and a computer-readable medium. Background technique [0002] With the development of computer network technology, Internet security issues are becoming more and more complex. At present, the loopholes for the Internet are mainly determined by scanning the loopholes of all data information on the network to determine whether there are loopholes in the data information. However, through this Vulnerability scanning in this way will consume a lot of time, reduce scanning efficiency, and put a certain pressure on the business system. Therefore, how to improve the efficiency of vulnerability scanning has become a hot spot in Internet security research. Contents of the invention [0003] The embodiment of the present invention provides a port vulnerability detection method, a terminal and a computer-readable medium, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/14H04L63/1433
Inventor 周东旭
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products