Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for actively discovering distributed self-built system and scanning security vulnerabilities

An active discovery and distributed technology, applied in the field of information security, can solve problems such as difficult data access, many information security loopholes, hidden dangers, etc., and achieve the effect of real-time reliable data support

Pending Publication Date: 2021-02-12
BC P INC CHINA NAT PETROLEUM CORP +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such self-built information systems are often not declared to the headquarters department. There are isolated information islands, data is difficult to get through, and there are many in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for actively discovering distributed self-built system and scanning security vulnerabilities
  • Method for actively discovering distributed self-built system and scanning security vulnerabilities
  • Method for actively discovering distributed self-built system and scanning security vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] The method for proactively discovering distributed self-built systems and scanning for security holes is characterized in that it includes the following steps:

[0030] Step 1, the user defines the time period in the timing task module, and the timing task module triggers the port scanning module to perform scanning tasks according to the time period defined by the user;

[0031] Step 2, the port scanning module resolves the target address segment predefined by the user, and resolves the target address segment into target addresses one by one, and sends a SYN packet requesting connection to a port of the target host of each target address; the scanning of the port scanning module The device scans the data packet returned by the target host, and determines whether the port of the target host is open according to the packet type...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for actively discovering a distributed self-built system and scanning security vulnerabilities, and relates to the technical field of information security. The methodcan be applied to management of distributed self-built systems deployed by subordinate units in large enterprises. According to the invention, active discovery of the whole-network self-built information system is realized by using a port scanning technology, an HTTP/HTTPS fingerprint identification technology, a distributed message queue technology, a browser engine rendering technology and a multi-process concurrent vulnerability scanning technology, and high-risk vulnerability scanning is carried out, so that explosive growth of the self-built information system and high-risk vulnerabilities is effectively restrained; a user can actively discover a database and a high-risk vulnerability database from a self-built system to guide out a scanning result report and a high-risk vulnerabilityreport of a self-built application system, and real-time and reliable data support is provided for a company informatization management layer for informatization construction conditions and information security conditions of organizational structure units at all levels.

Description

technical field [0001] The invention relates to the technical field of information security, and more specifically, relates to a method for proactively discovering distributed self-built systems and scanning for security vulnerabilities, and is especially suitable for large-scale organizations with complex organizational structures. Background technique [0002] Large-scale enterprise organizations generally have multi-level organizational structure units, and these subordinate units generally have various self-built information systems built through various funding channels to support the unit's production, operation, and office business. However, such self-built information systems are often not declared to the headquarters department. There are isolated information islands, data is difficult to get through, and there are many information security loopholes, which lay serious hidden dangers for enterprise information security and create obstacles for the harmonious and unif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F16/958G06F16/955H04L29/06H04L29/08
CPCG06F21/577G06F16/9566G06F16/986H04L63/1433H04L67/02
Inventor 冷炜镧梁泰崧武文斌程翀蒲旺宋庆波先兴伟周伟
Owner BC P INC CHINA NAT PETROLEUM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products