Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website vulnerability scanning method and apparatus, computer device and storage medium

A vulnerability scanning and website vulnerability technology, applied in the field of network security, can solve the problems of poor scanning effect and low scanning effectiveness, and achieve the effect of improving effectiveness, efficient discovery, and avoiding security risks

Active Publication Date: 2018-01-26
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide a website vulnerability scanning method, device, computer equipment and storage medium for the problems of low scanning effectiveness and poor scanning effect in the execution process of the above-mentioned website vulnerability scanning task

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website vulnerability scanning method and apparatus, computer device and storage medium
  • Website vulnerability scanning method and apparatus, computer device and storage medium
  • Website vulnerability scanning method and apparatus, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] see figure 1 , figure 1 It is a flowchart of a website vulnerability scanning method in an embodiment, and the method specifically includes the following steps:

[0054] Step 110, read the vulnerability scanning tasks in the scanning task pool.

[0055] The vulnerability scanning task refers to a task used to scan website vulnerabilities. Vulnerability scanning tasks include data for website vulnerability scanning, including but not limited to domain name, IP address, process port, URL (UniformResource Location, uniform resource locator) and CGI (common Gateway Interface, public gateway int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a website vulnerability scanning method and apparatus, a computer device and a storage medium. The method comprises the following steps: reading a vulnerability scanning taskin a scanning task pool; searching a website corresponding to the vulnerability scanning task, obtaining access data of the website, and obtaining a popularity coefficient of the website according tothe access data; obtaining historical vulnerability scanning data and a vulnerability risk grade table, and obtaining a security risk coefficient of the vulnerability scanning task according to the historical vulnerability scanning data and the vulnerability risk grade table; obtaining updating time data of the vulnerability scanning task, and calculating a time coefficient of the vulnerability scanning task according to the updating time data; inputting the popularity coefficient, the security risk coefficient and the time coefficient in a preset priority evaluation model for processing to obtain an execution priority weight of the vulnerability scanning task; and executing the vulnerability scanning tasks in the scanning task pool according to the execution priority weights from large tosmall. The scanning effectiveness can be improved, and the scanning effect is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a website vulnerability scanning method, device, computer equipment and storage medium. Background technique [0002] Website vulnerability scanning technology plays an important role in guaranteeing network security. At present, when website vulnerability scanning is performed, the vulnerability scanning tasks are generally scheduled and executed in sequence, or randomly scheduled and executed. However, the above scanning task execution method does not consider the differences between the vulnerability scanning tasks, so there is a certain degree of blindness and repetition, and it is impossible to quickly and effectively discover the security vulnerabilities of the website, resulting in low effectiveness of website vulnerability scanning, The scanning effect is poor, and it cannot effectively avoid the security risks of the website and effectively protect the user's d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCG06F21/552G06F21/57H04L63/1433
Inventor 何双宁
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products