Check patentability & draft patents in minutes with Patsnap Eureka AI!

Multi-node vulnerability scanning method and device, electronic equipment and storage medium

A vulnerability scanning and multi-node technology, applied in the field of network security, can solve the problems of inaccurate vulnerability scanning, etc., and achieve the effect of reducing the risk of network security vulnerabilities, avoiding attacks, and fast scanning speed

Pending Publication Date: 2022-04-12
深圳市亿威尔信息技术股份有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that the current vulnerability scanning is inaccurate. In view of the above-mentioned defects in the prior art, the present invention provides a multi-node vulnerability scanning method on the one hand, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-node vulnerability scanning method and device, electronic equipment and storage medium
  • Multi-node vulnerability scanning method and device, electronic equipment and storage medium
  • Multi-node vulnerability scanning method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] see figure 1 , is a flow chart of the multi-node vulnerability scanning method of the present invention. Such as figure 1 As shown, in the multi-node vulnerability scanning method provided in the first embodiment of the present invention, at least the steps include,

[0035] S1. Acquiring terminal information to be scanned.

[0036] Terminal information to be scanned, in general, includes services on different ports of the target host’s ICP / IP, for example, whether anonymous login is possible, whether there is a writable FTP directory, whether Telnet, httpd can be used, whether it is running as root, etc. etc., the allocation of various TCP / IP ports of the Web server, open services, Web service software versions, and the information presented by these services and software on the Internet, etc.

[0037] For example, in the scan of TCP port 80, if / cgi-bin / phf or / cgi-bin / count, cgi is found, according to the sharing and standardization of CGI programs, it can be spec...

Embodiment 2

[0088] see figure 2 , is a schematic structural diagram of a multi-node vulnerability scanning device of the present invention. Such as figure 2 As shown, in the multi-node vulnerability scanning device provided in the first embodiment of the present invention, at least include:

[0089] A multi-node vulnerability scanning device, comprising:

[0090] The terminal information acquisition module to be scanned is used to acquire terminal information to be scanned;

[0091] The multi-node vulnerability scanning rule setting module is used to set multi-node vulnerability scanning rules according to the terminal information to be scanned;

[0092] The vulnerability scanning module is used to perform vulnerability scanning according to multi-node vulnerability scanning rules.

[0093] In specific implementation, the Phytium FT-1500A / 16 core processor can be used to scan for vulnerabilities, adopt a distributed architecture, design a multi-task and multi-node vulnerability scan...

Embodiment 3

[0097] image 3 It is a schematic diagram of a physical structure of an electronic device provided according to an embodiment of the present invention. Based on the content of the above-mentioned embodiments, such as image 3 As shown, the electronic device may include: a processor (processor) 301, a memory (memory) 302 and a bus 303; wherein, the processor 301 and the memory 302 complete mutual communication through the bus 303; the processor 301 is used to call the memory stored in The computer program instructions in the memory 302 and operable on the processor 301 to execute the multi-node vulnerability scanning methods provided by the above method embodiments include, for example:

[0098] S1. Acquiring terminal information to be scanned;

[0099] S2. Set multi-node vulnerability scanning rules according to the terminal information to be scanned;

[0100] S3. Vulnerability scanning is performed according to multi-node vulnerability scanning rules.

[0101] In addition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-node vulnerability scanning method and device, electronic equipment and a storage medium, and the method comprises the steps: obtaining to-be-scanned terminal information; setting a multi-node vulnerability scanning rule according to the to-be-scanned terminal information; and performing vulnerability scanning according to the multi-node vulnerability scanning rule. A distributed architecture is adopted, a multi-task multi-node vulnerability scanning mode is designed, vulnerability scanning is actively and passively performed on the data center, vulnerability scanning results on multiple nodes are also regularly followed, specific nodes of the data center are counted and analyzed, so that the data center is more easily attacked by network security, the scanning speed is high, a data center vulnerability protection wall is established, and the security of the data center is improved. And the data center is prevented from being attacked by network security. The stability, reliability and security of the data center are improved, the security barrier of the data center is constructed, and the network security vulnerability risk is reduced.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically, relates to a multi-node vulnerability scanning method, device, electronic equipment and storage medium. Background technique [0002] The missing scan platform is a comprehensive security platform that provides a variety of security detection tools. The security detection tool can scan the vulnerabilities of the terminals to be scanned in the data center and obtain the corresponding scanning results, so that relevant personnel can determine according to the scanning results. In the data center, the network security configuration of the terminals to be scanned and the loopholes in the running application services can be repaired in time. [0003] However, when scanning the data center for vulnerabilities, it needs to be connected to the data center. Scanning the data of the terminal, the security of the data is poor, and when the network between the missed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F21/44G06F21/57
Inventor 王玮郭积妥陈德彬张军邵流河徐安舒康少明
Owner 深圳市亿威尔信息技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More