Supercharge Your Innovation With Domain-Expert AI Agents!

Network vulnerability scanning method and device

A scanning method and technology of a scanning device are applied in the field of network security and can solve the problems of low scanning efficiency, low efficiency of manual scanning methods, poor applicability and the like

Active Publication Date: 2021-04-30
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that network administrators need not only patience but also rich professional experience, which has poor applicability, and the manual scanning method has low efficiency and low accuracy
It can be seen that the existing network vulnerability scanning methods have high professional requirements, poor applicability, low scanning efficiency and low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network vulnerability scanning method and device
  • Network vulnerability scanning method and device
  • Network vulnerability scanning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Please see figure 1 , figure 1A schematic flowchart of a network vulnerability scanning method is provided for the embodiment of the present application. Wherein, the network vulnerability scanning method includes:

[0056] S101. Obtain data to be scanned.

[0057] In the embodiment of the present application, the data to be scanned may be log data, scanning target data, etc., which is not limited in the embodiment of the present application.

[0058] In this embodiment of the present application, the scanning target is preset, and specifically may be a network address target, such as a URL (Uniform Resource Locator, Uniform Resource Locator, Uniform Resource Locator) and the like.

[0059] In this embodiment of the present application, the subject of execution of the method may be a scanning device.

[0060] In the embodiment of the present application, the scanning device may be a computing device such as a computer or a server, which is not limited in this embodi...

Embodiment 2

[0087] Please see figure 2 , figure 2 It is a schematic flowchart of a network vulnerability scanning method provided in the embodiment of the present application. Such as figure 2 As shown, wherein, the network vulnerability scanning method includes:

[0088] S201. Obtain data to be scanned.

[0089] S202. When the data to be scanned is log data, determine that the source type of the data to be scanned is a log type; and when the data to be scanned is preset target data, determine that the source type of the data to be scanned is a scan target type.

[0090] In the embodiment of the present application, the source type of the data to be scanned can be determined by implementing the above step S202.

[0091] S203. When the source type is a log type, acquire a preset knowledge base and a first scanning policy corresponding to the log type.

[0092] In this embodiment of the present application, before step S201, detection parameters may also be pre-configured, which are...

Embodiment 3

[0126] Please see image 3 , image 3 It is a schematic flowchart of a network vulnerability scanning method provided in the embodiment of the present application. Such as image 3 As shown, wherein, the network vulnerability scanning method includes:

[0127] S301. Obtain data to be scanned.

[0128] S302. When the data to be scanned is log data, determine that the source type of the data to be scanned is a log type; and when the data to be scanned is preset target data, determine that the source type of the data to be scanned is a scan target type.

[0129] In the embodiment of the present application, the source type of the data to be scanned can be determined by implementing the above step S302.

[0130] In the embodiment of the present application, when the source type is the scanning target type, it is the scanning target preset in the scanning device. After the scanning parameters are configured, a collection of scanning strategies will be loaded. For example, an i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a network vulnerability scanning method and device, and relates to the technical field of network security, and the method comprises the steps: obtaining to-be-scanned data, determining the source type of the to-be-scanned data, determining a scanning strategy for the to-be-scanned data according to the source type, finally performing vulnerability scanning processing on the to-be-scanned data according to the scanning strategy, and obtaining a network vulnerability scanning result. According to the invention, the network vulnerability scanning can be automatically conducted, the professional requirement is low, applicability is high, manual operation is not needed, and therefore the scanning efficiency and the scanning accuracy can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a method and device for scanning network vulnerabilities. Background technique [0002] Currently, web-related vulnerability detection can be realized through network vulnerability scanning technology, thereby effectively improving network security. In the existing network vulnerability scanning method, the network administrator usually conducts manual testing and auditing through the scanning plug-in, and then obtains the vulnerability scanning result. However, in practice, it is found that network administrators need not only patience but also rich professional experience, which has poor applicability, and the manual scanning method has low efficiency and low accuracy. It can be seen that the existing network vulnerability scanning methods have high professional requirements, poor applicability, low scanning efficiency and low accuracy. Contents of the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 章晓祥
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More