Vulnerability scanning method, device and equipment and computer readable storage medium

A vulnerability scanning and vulnerability technology, applied in the field of financial technology, can solve the problems of slow identification of network service types and low vulnerability scanning efficiency.

Pending Publication Date: 2020-10-13
WEBANK (CHINA)
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of network service identification, it is necessary to send data packets to all open ports for network service ide

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method, device and equipment and computer readable storage medium
  • Vulnerability scanning method, device and equipment and computer readable storage medium
  • Vulnerability scanning method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] refer to figure 1 , figure 1 It is a schematic diagram of the device structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0044] The vulnerability scanning device in this embodiment of the present invention may be a smart phone, or a terminal device such as a PC (Personal Computer, personal computer), a tablet computer, or a portable computer.

[0045] Such as figure 1 As shown, the vulnerability scanning device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of financial science and technology, and discloses a vulnerability scanning method, device and equipment and a computer readable storage medium. The vulnerability scanning method comprises the steps: obtaining an open port identifier and network service process information of a to-be-scanned host; matching the network service process information with process fingerprints in a preset fingerprint library, and determining a network service type corresponding to the network service process information according to a matching result; determining a targetvulnerability tool according to the network service type, and scanning an open port corresponding to the open port identifier of the to-be-scanned host through the target vulnerability tool to obtaina vulnerability scanning result. According to the method disclosed in the invention, the identification speed of the network service type can be improved so as to improve the vulnerability scanning efficiency.

Description

technical field [0001] The present invention relates to the technical field of financial technology (Fintech), in particular to a vulnerability scanning method, device, equipment and computer-readable storage medium. Background technique [0002] With the development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually transforming into Fintech. However, due to the security and real-time requirements of the financial industry, higher requirements are placed on technology. requirements. [0003] In the increasingly severe situation of network security, the focus of network protection has gradually shifted from passive defense to active defense, that is, to adopt remote vulnerability scanning technology to actively detect vulnerabilities in remote host systems, and take timely countermeasures to prevent problems before they happen. [0004] The existing vulnerability scanning system first ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/20
Inventor 王浩生
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products