CN107547473A - A kind of Security Vulnerabilities Scanner System - Google Patents

A kind of Security Vulnerabilities Scanner System Download PDF

Info

Publication number
CN107547473A
CN107547473A CN201610477502.2A CN201610477502A CN107547473A CN 107547473 A CN107547473 A CN 107547473A CN 201610477502 A CN201610477502 A CN 201610477502A CN 107547473 A CN107547473 A CN 107547473A
Authority
CN
China
Prior art keywords
module
client
security vulnerabilities
scanner system
explanation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610477502.2A
Other languages
Chinese (zh)
Inventor
马炳刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang Aoli Fulong Technology Development Co Ltd
Original Assignee
Heilongjiang Aoli Fulong Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang Aoli Fulong Technology Development Co Ltd filed Critical Heilongjiang Aoli Fulong Technology Development Co Ltd
Priority to CN201610477502.2A priority Critical patent/CN107547473A/en
Publication of CN107547473A publication Critical patent/CN107547473A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of Security Vulnerabilities Scanner System, including distribution and Coordination module, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.The Security Vulnerabilities Scanner System of the present invention, establishes and deletes legal client user, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.

Description

A kind of Security Vulnerabilities Scanner System
Technical field
The present invention relates to a kind of scanning system, and in particular to a kind of Security Vulnerabilities Scanner System, belongs to computer peripheral technical field.
Background technology
Computer is a kind of electronic computer device for supercomputing, can carry out numerical computations, logical calculated can be carried out again, also with store-memory function;It is that can be run according to program, automatic, the modernization intelligent electronic device of high speed processing mass data.With the utilizations of Internet extensively and profoundly, network system security event occurs again and again, is due to much the result that network system has leak, therefore how to find and repair these existing leaks just into the hot subject of current research;For this problem, devise many Security Vulnerabilities Scanner Systems, but, because these existing systems are established one's own system, compatibility is poor, although some systems are using CVE (Common Vulnerabilities and Exposure) standards as the foundation for indexing leak now, if only this and oneself, will realize that the shared of most of data is impossible;Therefore, in order to solve problem above, it is proposed that a more perfect Security Vulnerabilities Scanner System.
The content of the invention
(One)Technical problems to be solved
To solve the above problems, the present invention proposes a kind of Security Vulnerabilities Scanner System, legal client user is established and deletes, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.
(Two)Technical scheme
The Security Vulnerabilities Scanner System of the present invention, including distribution and Coordination module, the possibility that data and information exchange is provided for each module, that is, the input/output switching mouth of each intermodule, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.
Further, the result treatment module is connected with results repository.
Further, the explanation module is connected with plugin library.
Further, the configuration module, communication module and result treatment module are connected with client.
(Three)Beneficial effect
Compared with prior art, Security Vulnerabilities Scanner System of the invention, legal client user is established and deleted, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.
Brief description of the drawings
Fig. 1 is the overall structure schematic block diagram of the present invention.
Part marks in accompanying drawing:1- is distributed and Coordination module, 2- configuration modules, 3- communication modules, 4- result treatment modules, 5- explanation modules, 6- multi-process, multiple threads module, 7- database interfaces, 8- results repositories, 9- plugin libraries, 10- clients, 11- lifting modules.
Embodiment
A kind of Security Vulnerabilities Scanner System as shown in Figure 1, including distribution and Coordination module 1, and configuration module 2, communication module 3, result treatment module 4, explanation module 5, lifting module 11 and multi-process, the multiple threads module 6 being connected with distribution and Coordination module 1;Described its output end of result treatment module 4 is connected by database interface 7 with explanation module 5.
The result treatment module 4 is connected with results repository 8.
The explanation module 5 is connected with plugin library 9.
The configuration module 2, communication module 3 and result treatment module 4 are connected with client 10.
The Security Vulnerabilities Scanner System of the present invention, distribution and Coordination module, it is the core node that co-ordination is carried out between each processing module of the system, its function is provides data and the possibility of information exchange for each module, that is, the input/output switching mouth of each intermodule;The execution of each module is called according to a graded;Therefore, overall process of the control action of this module through Vulnerability scan system operation;
Configuration module, on the one hand, (which part is by service end default setting, is set by client for definition, configuration scanning strategy and setting sweep parameter;On the other hand, subscriber management function (addition, delete and change authorized user);
Communication module, it is that the system service end carries out the certification of authorized user, the coordination of communication encryption system and analysis with client and handles information of transmission of both sides etc.;On the one hand, sweep parameter, the scanning target of client setting are submitted to service end by it;On the other hand, objective result service end scanned submits to client;Therefore this module will be related to the formulation of communication protocol, cryptographic protocol;
Result treatment module, according to the requirement of client, client is sent the result to immediately or the function of user is submitted to lettergram mode;Function of the backup scanning result to database service end (calling preservation and read module);It is multiple to same targeted scans in a short time to avoid, take the strategy for directly utilizing lastlook (in certain time);
Explanation module, mainly explain plug-in unit attack code function;In addition, also comprising all Database fields such as the plug-in unit numbering in processing plugin library, the descriptions of leak title, leak;Meanwhile when upgrading to the system, plugin library can be increased by this module, change operation;
The establishment and end of multi-process, multiple threads module, treatment progress and thread;Communication and control between treatment progress, between thread etc..
The above-described embodiments are merely illustrative of preferred embodiments of the present invention, and not the spirit and scope of the present invention are defined.On the premise of design concept of the present invention is not departed from; the all variations and modifications that ordinary people in the field makes to technical scheme; protection scope of the present invention all should be dropped into, the claimed technology contents of the present invention, has all been recorded in detail in the claims.

Claims (4)

  1. A kind of 1. Security Vulnerabilities Scanner System, it is characterised in that:Including distribution and Coordination module, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.
  2. 2. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The result treatment module is connected with results repository.
  3. 3. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The explanation module is connected with plugin library.
  4. 4. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The configuration module, communication module and result treatment module are connected with client.
CN201610477502.2A 2016-06-27 2016-06-27 A kind of Security Vulnerabilities Scanner System Pending CN107547473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610477502.2A CN107547473A (en) 2016-06-27 2016-06-27 A kind of Security Vulnerabilities Scanner System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610477502.2A CN107547473A (en) 2016-06-27 2016-06-27 A kind of Security Vulnerabilities Scanner System

Publications (1)

Publication Number Publication Date
CN107547473A true CN107547473A (en) 2018-01-05

Family

ID=60961362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610477502.2A Pending CN107547473A (en) 2016-06-27 2016-06-27 A kind of Security Vulnerabilities Scanner System

Country Status (1)

Country Link
CN (1) CN107547473A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600371A (en) * 2018-12-08 2019-04-09 公安部第三研究所 A kind of network layer leakage location and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600371A (en) * 2018-12-08 2019-04-09 公安部第三研究所 A kind of network layer leakage location and method

Similar Documents

Publication Publication Date Title
US8448238B1 (en) Network security as a service using virtual secure channels
US20070066280A1 (en) Connection management system, method and program
Chandia et al. Security strategies for SCADA networks
CN111488595A (en) Method for realizing authority control and related equipment
CN107733863B (en) Log debugging method and device under distributed hadoop environment
CN104158767B (en) A kind of network admittance device and method
US20080275843A1 (en) Identifying an application user as a source of database activity
KR101877655B1 (en) Intelligent firewall access rules
CN104601530A (en) Implementing method and system for could security service
CN110430280B (en) Account automatic login method and system, storage medium and cloud desktop server
WO2018160252A1 (en) Determining security vulnerabilities in application programming interfaces
CN109213790A (en) A kind of data circulation analysis method and system based on block chain
CN111585956B (en) Website anti-brushing verification method and device
CN105871919A (en) Network application firewall system and realization method thereof
EP4030802A1 (en) Method and apparatus for managing subscription data
Cui et al. IoT data management and lineage traceability: A blockchain-based solution
Zhang et al. Overview of IoT security architecture
CN103957174A (en) Method for semantic switch loose coupling system to process information
Kant et al. Analysis of IoT security risks based on the exposure of the MQTT protocol
CN110099041A (en) A kind of Internet of Things means of defence and equipment, system
CN105025548B (en) A kind of the connection control method and device of SIM card
US8793782B1 (en) Enforcing a health policy in a local area network
Ayedh M et al. Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
CN107547473A (en) A kind of Security Vulnerabilities Scanner System
CN106537962A (en) Method, device, and equipment for wireless network configuration, access, and visit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180105