Batch host security scanning and reinforcing method

A security scanning and host technology, applied in the field of computer information, can solve problems such as system abnormal termination, inability to adapt, errors, etc., achieve robust batch management and avoid repetitive work

Pending Publication Date: 2022-04-22
芃飞软件科技无锡有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1) When the number of servers is large, the installation and configuration of the server system is more troublesome, full of a lot of repetitive work;
[0010] 2) The security scan, vulnerability discovery, patch installation, and system hardening of the server need to be done manually by the administrator, and there are many limitations in the automated script, which cannot adapt to all situations;
[0012] 4) The upgrade strategy, patch installation strategy, and security hardening strategy of different servers may be different, which needs to be distinguished by the administrator;
[0013] 5) After some software is upgraded, it may be incompatible or run incorrectly, and may even cause the system to terminate abnormally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch host security scanning and reinforcing method
  • Batch host security scanning and reinforcing method
  • Batch host security scanning and reinforcing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0039] In a first aspect, the present invention provides a batch host security scanning and reinforcement method, including: an online host scanning method, a system vulnerability scanning method, and a host reinforcement method.

[0040] see figure 1 , in response to receiving an online host scanning instruction, use the host scanning method to scan all online hosts in the LAN, and the process is as follows:

[0041] Input: the address of the network segment to be scanned (format: network / network prefix length, for example: 192.168.24.0 / 24)

[0042] Output: List of online host IPs

[0043] 101) Generate a host IP address list in the network segment, initialize the pointer position as the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a batch host security scanning and reinforcing method, and belongs to the technical field of computer information, and the method comprises the steps: responding to a received online host scanning instruction, scanning all online hosts in a local area network, and updating host information; in response to the received vulnerability scanning instruction, scanning system vulnerabilities existing in the online host; and in response to a received host reinforcement instruction, installing a vulnerability patch for the to-be-reinforced host, or setting a security policy. By using the batch host security scanning and reinforcing method disclosed by the invention, operation and maintenance, management, scanning and security reinforcement can be carried out on all hosts in a local area network in batches, and repeated work of an administrator is avoided. The invention further discloses a batch host security scanning and reinforcing system which can be quickly deployed on a server to provide an easy and convenient operation interface for an administrator.

Description

technical field [0001] The invention relates to a batch host security scanning and strengthening method, which belongs to the technical field of computer information. Background technique [0002] The world is in the midst of a new round of technological revolution and industrial transformation. Digital technologies represented by the Internet, big data, and artificial intelligence have penetrated into all fields of economy and society. The world has entered the era of Internet of Everything, data-driven, software-defined, platform The era of digital economy characterized by support and intelligence dominance. [0003] According to W3C statistics, the number of web servers has increased exponentially in 28 years: from single digits in the 1990s to more than 9.5 million in 2000, and in 2019, the total number of web servers has exceeded 1.717 billion indivual. In addition, according to IDC's "China Server Market Tracking Report for the Second Quarter of 2020", in the first h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L67/54H04L41/08H04L41/0894G06F21/57
CPCH04L41/0889H04L41/0893G06F21/577
Inventor 常兴治张运泽刘帅帅龙霄汉高亮
Owner 芃飞软件科技无锡有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products