Unlock instant, AI-driven research and patent intelligence for your innovation.

Vulnerability scanning method, server and system

a vulnerability scanning and server technology, applied in the field of internet technology, can solve the problems of increasing prominence of information security on the internet, major limitation of vulnerability scanning method, and inapplicability of customized scanning content, so as to improve the efficiency of vulnerability scanning, comprehensive scanning process, and the effect of spotting possible vulnerabilities in the specified host servi

Active Publication Date: 2021-07-22
CHINANETCENT TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach enables deeper and more comprehensive vulnerability scanning, improving accuracy and efficiency by tailoring scan tasks to specific host services and components, and utilizing a distributed scanning mode for parallel execution by multiple proxy nodes.

Problems solved by technology

With the continuous development of Internet technology, the problem of information security on the Internet has become increasingly prominent.
However, this vulnerability scanning method has a major limitation.
For different computers, the customized scanning content may be not applicable, or a full vulnerability scan cannot be conducted on these computers.
Therefore, the accuracy of vulnerability scanning in the existing technologies is not high enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method, server and system
  • Vulnerability scanning method, server and system
  • Vulnerability scanning method, server and system

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

[0017]The technical solutions provided by the present disclosure may be applied to a system architecture shown in FIG. 1. Referring to FIG. 1, the system architecture may include a server, a task scheduling center, and a proxy node. The server may be configured to create a scan task for vulnerability scanning, the task scheduling center may receive a scan task issued by the server, and the proxy node may acquire a scan task from the task scheduling center, execute the acquired scan task for the corresponding host to obtain a scan result related to the host. The scan result may be reported by the proxy node to the server.

[0018]In the present disclosure, the system architecture may be deployed in a manner of a distributed system. There may be a plurality of proxy nodes. Each proxy node may be connected to the task scheduling center. Some proxy nodes may obtain different scan tasks for the same host, and these proxy nodes may execute the acquired scan tasks in parallel, thereby improvi...

embodiment 2

[0038]Referring to FIG. 4, the present disclosure further provides a server. The server comprises a memory and a process, where the memory stores computer programs that, when executed by the processor, implement the following steps:

[0039]S11: identifying a host service running on a target host and creating a scan task that matches the identified host service;

[0040]S13: issuing the created scan task to a task scheduling center, to allow a proxy node to acquire at least one scan task from the task scheduling center, where the proxy node executes the at least one scan task for the target host, and obtains a scan result; and

[0041]S15: receiving the scan result fed back by the proxy node, determining whether there exists a specified host service in the identified host service, where the specified host service signifies an existence of a web site resource running on the target host, and if there exists the specified host service in the identified host service, issuing again a scan subtask...

embodiment 3

[0048]Referring to FIG. 1 and FIG. 5, the present disclosure further provides a vulnerability scanning system. The system comprises a server, a task scheduling center, and a proxy node, where:

[0049]the server is configured to identify a host service running on a target host, create a scan task that matches the identified host service, issue the created scan task to a task scheduling center, determine whether there exists a specified host service in the identified host service, where the specified host service signifies an existence of a website resource running on the target host, if there exists the specified host service in the identified host service, issue again a scan subtask corresponding to the specified host service to the task scheduling center, and receive a scan result fed back by the proxy node;

[0050]the task scheduling center is configured to receive the scan task or scan subtask issued by the server, and place the received scan task or scan subtask in a task queue; and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A vulnerability scanning method includes: identifying a host service running on a target host and creating a scan task that matches the identified host service; issuing the created scan task to a task scheduling center, to allow a proxy node to acquire at least one scan task from the task scheduling center, where the proxy node executes the at least one scan task for the target host, and obtains a scan result; and receiving the scan result fed back by the proxy node, determining whether there exists a specified host service in the identified host service, where the specified host service signifies an existence of a web site resource running on the target host, and if there exists the specified host service in the identified host service, issuing again a scan subtask corresponding to the specified host service to the task scheduling center.

Description

FIELD OF THE DISCLOSURE[0001]The present disclosure generally relates to the field of Internet technology and, more particularly, relates to a vulnerability scanning method, a server, and a system thereof.BACKGROUND[0002]With the continuous development of Internet technology, the problem of information security on the Internet has become increasingly prominent. At present, cyber-attacks exploiting computer vulnerability and network system flaws have become an important way for criminals to seek private interests and commit crimes. In order to fix computer vulnerabilities in time, it is usually necessary to employ a vulnerability scanning tool to scan a computer so as to detect existing or potential vulnerabilities in the computer.[0003]When a traditional vulnerability scanning tool scans a computer, the scanning content is pre-customized. The vulnerability scanning tool may execute a one-time scan of the pre-customized scanning content, thereby detecting potential vulnerabilities de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L67/10H04L67/56H04L67/60G06F21/54H04L63/0281H04L67/563H04L67/63
Inventor WANG, HAIHANXU, YOUNANZHONG, QIFUSHI, CHUNYI
Owner CHINANETCENT TECH