Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A vulnerability scanning method and device

A vulnerability scanning and scanning unit technology, applied in the field of network security, can solve the problem of low scanning efficiency, achieve the effect of improving scanning efficiency and avoiding repeated loading

Active Publication Date: 2021-10-29
HANGZHOU DPTECH TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For such services that need to load the same service plug-in, the system vulnerability scanner usually loads the same service plug-in for scanning for each service, that is, there are repeated loading of the same service plug-in, and the scanning efficiency is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability scanning method and device
  • A vulnerability scanning method and device
  • A vulnerability scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.

[0021] It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of this specification, first information may also be called second information, and similarly, second information may also be calle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a vulnerability scanning method and device. A vulnerability scanning method includes: obtaining services provided by at least one local port of a target host; for each service, determining a service plug-in corresponding to the service; the service plug-in is a plug-in called when performing a vulnerability scan on the service; Each service corresponds to a first service plug-in, then load the first service plug-in to a specified storage medium, so as to use the first service plug-in loaded in the specified storage medium to provide the at least two services provided by the target host The service performs a vulnerability scan. The foregoing method can avoid repeated loading of the same plug-in during vulnerability scanning, thereby improving scanning efficiency.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a vulnerability scanning method and device. Background technique [0002] At present, criminals often use system vulnerabilities to carry out attacks such as information theft and damage to the system. In order to protect these attacks, many network security products have emerged as the times require. For example, the system vulnerability scanner can actively scan system vulnerabilities and report the scanning results, so that system vulnerabilities can be repaired in time. [0003] Currently common system vulnerability scanners scan the ports of the host to determine the services provided by each port of the host, and then load corresponding service plug-ins for each service to perform vulnerability scanning. A host usually has a large number of ports to provide corresponding services, and for the services provided by some of these ports, the system vulnerabi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 马登耀
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products