Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability scanning method, device, computer equipment and storage medium

A vulnerability scanning and computer program technology, applied in the computer field, can solve the problem of low scanning efficiency, achieve the effect of reducing the number of executions, improving efficiency, and reducing the amount of scanning

Active Publication Date: 2019-09-24
PING AN TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the traditional vulnerability scanning technology is that the scanning server actively crawls the data to be scanned in the server through crawler technology, and then judges whether the crawled data has vulnerabilities through all the vulnerability matching rules in the vulnerability database, and the scanning efficiency is relatively low. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability scanning method, device, computer equipment and storage medium
  • Vulnerability scanning method, device, computer equipment and storage medium
  • Vulnerability scanning method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0049] The vulnerability scanning method provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the terminal can access resources on the network through the core switch or router, etc., and the scanning server can intercept the traffic data of the terminal through the core switch or router, or the scanning server can intercept the traffic data of the terminal by setting up a proxy server, thereby scanning When the server intercepts the traffic data, it can passively scan the traffic data to determine whether the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A vulnerability scanning method, a system, a computer apparatus, and a storage medium. The method comprises: intercepting traffic data to be scanned; determining whether the intercepted traffic data to be scanned is dynamic data; if so, performing a search to determine whether there is a parameter for the traffic data to be scanned; if so, acquiring the type of the traffic data to be scanned; acquiring a vulnerability scanning rule corresponding to the type of the traffic data to be scanned; and performing a vulnerability scan on the traffic data to be scanned by means of the vulnerability scanning rule.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a vulnerability scanning method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology, vulnerability scanning technology has appeared. The traditional vulnerability scanning technology refers to the detection of the security vulnerabilities of the specified remote or local computer system through scanning and other means based on the vulnerability database, and the discovery of exploitable vulnerabilities. A security detection (penetration attack) behavior. [0003] However, the traditional vulnerability scanning technology is that the scanning server actively crawls the data to be scanned in the server through crawler technology, and then judges whether the crawled data has vulnerabilities through all the vulnerability matching rules in the vulnerability database, and the scanning efficiency is relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 周圣龙
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products