Vulnerability scanning method and device, equipment and storage medium

A vulnerability scanning and vulnerability technology, which is applied in the field of network security, can solve the problems of large number of connections and low efficiency of vulnerability scanning, and achieve the effect of reducing the number of vulnerabilities and improving the efficiency of vulnerability scanning

Pending Publication Date: 2021-10-26
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when performing a vulnerability scan on a host, after the software and version of a host are scanned, the software on the host is then detected for vulnerabilities, and a copy of the basic information of each hos

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method and device, equipment and storage medium
  • Vulnerability scanning method and device, equipment and storage medium
  • Vulnerability scanning method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0061] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0062] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0063] In order to reduce the number of connections between hosts directly associated with vulnerabilities, thereby improving the efficiency of vulnerability scanning, an embodiment of the present disclosure provides a vulnerability scanning method. First, determine the software identification co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a vulnerability scanning method and device, equipment and a storage medium, and the method comprises the steps: determining a software identifier corresponding to a first target host and a version number corresponding to the software identifier, and determining an association relationship between the software identifier and the version number as a first target software version; matching the first target software version with a software version in pre-acquired vulnerability structure information; if determining that the first target software version is successfully matched with any software version in the vulnerability structure information, establishing an association relationship between the software version and the first target host in the vulnerability structure information; and performing vulnerability scanning on the first target host based on the vulnerability having the association relationship with the first target host in the updated vulnerability structure information. Visibly, the number of vulnerabilities associated with the host is reduced based on the relationship between the vulnerabilities and the software version, so that the vulnerability scanning efficiency is improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular to a vulnerability scanning method, device, equipment and storage medium. Background technique [0002] Vulnerability scanning is one of the core technologies of network security. Its main function is to discover vulnerabilities and provide repair suggestions to ensure user information security. At present, when performing a vulnerability scan on a host, after the software and version of a host are scanned, the software on the host is then detected for vulnerabilities, and a copy of the basic information of each host and all the scanned vulnerability data is saved when storing. , resulting in a large number of connections directly related to the host and the vulnerability, and therefore may lead to low efficiency of vulnerability scanning. Contents of the invention [0003] In order to solve the above technical problems or at least partly solve the above tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F8/71G06F8/65G06K9/62
CPCG06F21/577G06F8/71G06F8/65G06F18/22
Inventor 袁旭
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products