Task processing method and device, computer equipment and storage medium

A task processing and task technology, applied in the field of cloud security, can solve the problems of low scanning efficiency, large amount of concurrent scanning tasks, and long scanning time, etc., and achieve the effect of improving scanning efficiency, avoiding system crashes, and orderly processing

Pending Publication Date: 2022-06-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of Internet technology, the number of network sites is also increasing day by day, and the number of concurrent scanning tasks to be processed by the vulnerability scanning system is very large, which makes the above-mentioned general vulnerability scanning system face the problems of long scanning time and low scanning efficiency , how to quickly complete vulnerability scanning is an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task processing method and device, computer equipment and storage medium
  • Task processing method and device, computer equipment and storage medium
  • Task processing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose of the present application, the technical solution and the advantages more clearly understood, the following combined with the accompanying drawings and embodiments, the present application will be further detailed in detail. It should be understood that the specific embodiments described herein are only used to explain the present application and are not used to limit the present application.

[0058] The present application provides a task processing method that may be applied to such as Figure 1 shown in the application environment. Wherein, the distributed dispatch server 102 communicates with the distributed probe server 104 through the network. Distributed scheduling server 102 receives the vulnerability scanning task corresponding to the website to be scanned, the vulnerability scanning task is stored in turn into the first message queue 106, the vulnerability scanning task is extracted from the first message queue 106, the subtask obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a task processing method and device, computer equipment and a storage medium. The method relates to cloud computing and cloud security technologies. The method comprises the following steps: receiving a vulnerability scanning task corresponding to a website to be scanned; storing the vulnerability scanning tasks in a first message queue in sequence; extracting a vulnerability scanning task from the first message queue; obtaining subtasks obtained by performing task decomposition on the extracted vulnerability scanning task; and in response to a task request of the distributed detection server, pushing the sub-task to the distributed detection server, so that the distributed detection server sends a vulnerability detection request to the to-be-scanned website according to the sub-task. By adopting the method, the vulnerability scanning efficiency can be improved.

Description

Technical field [0001] The present application relates to the field of cloud security technology, in particular to a task processing method, system, device, computer device and storage medium. Background [0002] Vulnerability scanning system is a vulnerability automated scanning tool, a general vulnerability scanning system, by sending a network request with customized rules to the scanned network site, according to the scanned network site response content to determine whether the scanned network site has vulnerabilities. [0003] With the rapid development of Internet technology, network sites are also increasing, the number of scanning tasks to be handled by the vulnerability scanning system is very large, which makes the above-mentioned general vulnerability scanning system face the problem of scanning time is too long, scanning efficiency is low, how to quickly complete the vulnerability scanning is an urgent problem to be solved. Contents of the Invention [0004] Based o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F9/54
CPCG06F21/577G06F9/546
Inventor 陈少鹏
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products