Vulnerability scanning method and device

A vulnerability scanning and scanning method technology, applied in the computer field, can solve problems such as low efficiency of vulnerability scanning, blockage of scanning tasks, task failure, etc., and achieve the effects of improving the efficiency of vulnerability scanning, reducing pressure, and avoiding failures

Inactive Publication Date: 2020-06-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] During the research and practice of related technologies, the inventors of this application found that when implementing vulnerability scanning, each scanning task needs to be entered and executed on the corresponding scanning node, which makes the efficiency of vulnerability scanning low. In addition, when entering When the scanning node that executes the scanning task fails, the failure of the scanning node will lead to the failure of the entire task, making the efficiency of vulnerability scanning even lower; moreover, it is very easy to block or even fail the scanning task due to massive data and network bottlenecks. Thus exacerbating the inefficiency of vulnerability scanning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device
  • Vulnerability scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0067] Embodiments of the present application provide a vulnerability scanning method and device. Specifically, the embodiment of the present application provides a vulnerability scanning device suitable for computer equipment. Wherein, the computer device may be a device such as a terminal or a server, and the terminal may be a device such as a mobile phone, a tablet computer, or a notebook computer. The server can be a single server or a server cluster composed of multiple servers.

[0068]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vulnerability scanning method and device. According to the embodiment of the invention, the method comprises the steps: determining a vulnerability scanningtask to be executed; dividing the vulnerability scanning task into at least one sub-vulnerability scanning task according to task information of the vulnerability scanning task, and adding the at least one sub-vulnerability scanning task into a first message queue; determining a target sub-vulnerability scanning task allocated to a scanning node based on the arrangement position of sub-vulnerability scanning tasks in the first message queue, wherein the scanning node is deployed in a distributed manner; sending the target sub-vulnerability scanning task to the scanning node; executing the target sub-vulnerability scanning task through the scanning node, and performing vulnerability scanning to obtain a scanning result. According to the scheme, the vulnerability scanning efficiency can beimproved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a vulnerability scanning method and device. Background technique [0002] With the development of the Internet, the issue of network security becomes more and more important. As an important network security technology, vulnerability scanning technology can effectively improve network security and discover potential security problems in the network. [0003] During the research and practice of related technologies, the inventors of this application found that when implementing vulnerability scanning, each scanning task needs to be entered and executed on the corresponding scanning node, which makes the efficiency of vulnerability scanning low. In addition, when entering When the scanning node that executes the scanning task fails, the failure of the scanning node will lead to the failure of the entire task, making the efficiency of vulnerability scanning even lower; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 邓书凡彭成锋温冠超刘善明刘志高黄梦媛
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products