Host device vulnerability scanning method and system

A host device and vulnerability scanning technology, applied in the field of information security, can solve the problems of increasing the load risk of the host device and affecting the performance of the host, and achieve the effects of avoiding repeated collection, reducing load and risk, and small occupancy rate

Pending Publication Date: 2019-09-06
STATE GRID CORP OF CHINA +5
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the disadvantages in the prior art that vulnerability scanning occupies too many resources, which affects the performance of the host, and frequent vulnerability scanning leads to an increase in the load risk of the host device, and provides a method for scanning the vulnerabilities of the host device, which includes the following steps:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host device vulnerability scanning method and system
  • Host device vulnerability scanning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described below in conjunction with the accompanying drawings.

[0042] Such as figure 1 As shown, it is a working flow chart of a host device vulnerability scanning method for a power monitoring system provided by a specific embodiment of the present invention. The method includes the following steps:

[0043] Step 1, collecting software version information of the host device.

[0044] The host device includes any one of a server, a gateway machine, and a workstation;

[0045] The method for collecting the software version information includes the following steps:

[0046] (1) Deploy the vulnerability scanning script and the host operating system security monitoring program Agent on the target host device at the same time. The Agent supports the operating systems commonly used in host devices in power monitoring systems such as Meditation, Kirin, Linux, Unix, and Windows;

[0047] (2) Call the Agent, and use dpkg and rpm to find...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a host device vulnerability scanning method and system in the technical field of information security, aiming at solving the technical problems that in the prior art, vulnerability scanning occupies too many resources, and host performance is affected, and the load risk of host equipment is increased due to frequent vulnerability scanning are solved. The host device vulnerability scanning method comprises the following steps: acquiring software version information of a host device; and comparing the collected software version information with software version information stored in a vulnerability library, and identifying the security vulnerability according to a comparison result. The host device vulnerability scanning system comprises an information acquisition module used for acquiring software version information of the host device, an information comparison module for comparing the collected software version information with software version information stored in a vulnerability library, and a vulnerability identification module for identifying security vulnerabilities according to comparison results.

Description

technical field [0001] The invention relates to a host device vulnerability scanning method and system, belonging to the technical field of information security. Background technique [0002] The power monitoring system uses host equipment, communication equipment, and measurement and control units as basic tools to provide a basic platform for real-time data collection, switch status detection, and remote control of power transformation and distribution systems. Since the power monitoring system has been running continuously for a long time, vulnerability scanning is generally performed on the host device in operation, and it is particularly important to reduce the impact of vulnerability scanning on the performance of the host device. [0003] The current vulnerability scanning needs to be performed on the host device and takes up a lot of resources, which will have a great impact on the performance of the host, and may cause serious consequences such as business interrupt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 韩勇景娜钟旭翔杨奎朱世顺陶洪铸周劼英张晓汪明程长春黄益彬刘苇裴培王黎明季昆玉张勇全思平韩禹许颖文翁蓓蓓蒋正威金学奇孔飘红肖艳炜
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products