CN107547473A - A kind of Security Vulnerabilities Scanner System - Google Patents
A kind of Security Vulnerabilities Scanner System Download PDFInfo
- Publication number
- CN107547473A CN107547473A CN201610477502.2A CN201610477502A CN107547473A CN 107547473 A CN107547473 A CN 107547473A CN 201610477502 A CN201610477502 A CN 201610477502A CN 107547473 A CN107547473 A CN 107547473A
- Authority
- CN
- China
- Prior art keywords
- module
- client
- security vulnerabilities
- scanner system
- explanation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of Security Vulnerabilities Scanner System, including distribution and Coordination module, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.The Security Vulnerabilities Scanner System of the present invention, establishes and deletes legal client user, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.
Description
Technical field
The present invention relates to a kind of scanning system, and in particular to a kind of Security Vulnerabilities Scanner System, belongs to computer peripheral technical field.
Background technology
Computer is a kind of electronic computer device for supercomputing, can carry out numerical computations, logical calculated can be carried out again, also with store-memory function;It is that can be run according to program, automatic, the modernization intelligent electronic device of high speed processing mass data.With the utilizations of Internet extensively and profoundly, network system security event occurs again and again, is due to much the result that network system has leak, therefore how to find and repair these existing leaks just into the hot subject of current research;For this problem, devise many Security Vulnerabilities Scanner Systems, but, because these existing systems are established one's own system, compatibility is poor, although some systems are using CVE (Common Vulnerabilities and Exposure) standards as the foundation for indexing leak now, if only this and oneself, will realize that the shared of most of data is impossible;Therefore, in order to solve problem above, it is proposed that a more perfect Security Vulnerabilities Scanner System.
The content of the invention
(One)Technical problems to be solved
To solve the above problems, the present invention proposes a kind of Security Vulnerabilities Scanner System, legal client user is established and deletes, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.
(Two)Technical scheme
The Security Vulnerabilities Scanner System of the present invention, including distribution and Coordination module, the possibility that data and information exchange is provided for each module, that is, the input/output switching mouth of each intermodule, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.
Further, the result treatment module is connected with results repository.
Further, the explanation module is connected with plugin library.
Further, the configuration module, communication module and result treatment module are connected with client.
(Three)Beneficial effect
Compared with prior art, Security Vulnerabilities Scanner System of the invention, legal client user is established and deleted, and client can be authenticated operating;The scan task and parameter of reception client submission are simultaneously scanned operation to target;Preserve scanning result and be sent to client;Possess upgrade function and optimize the function of sweep speed.
Brief description of the drawings
Fig. 1 is the overall structure schematic block diagram of the present invention.
Part marks in accompanying drawing:1- is distributed and Coordination module, 2- configuration modules, 3- communication modules, 4- result treatment modules, 5- explanation modules, 6- multi-process, multiple threads module, 7- database interfaces, 8- results repositories, 9- plugin libraries, 10- clients, 11- lifting modules.
Embodiment
A kind of Security Vulnerabilities Scanner System as shown in Figure 1, including distribution and Coordination module 1, and configuration module 2, communication module 3, result treatment module 4, explanation module 5, lifting module 11 and multi-process, the multiple threads module 6 being connected with distribution and Coordination module 1;Described its output end of result treatment module 4 is connected by database interface 7 with explanation module 5.
The result treatment module 4 is connected with results repository 8.
The explanation module 5 is connected with plugin library 9.
The configuration module 2, communication module 3 and result treatment module 4 are connected with client 10.
The Security Vulnerabilities Scanner System of the present invention, distribution and Coordination module, it is the core node that co-ordination is carried out between each processing module of the system, its function is provides data and the possibility of information exchange for each module, that is, the input/output switching mouth of each intermodule;The execution of each module is called according to a graded;Therefore, overall process of the control action of this module through Vulnerability scan system operation;
Configuration module, on the one hand, (which part is by service end default setting, is set by client for definition, configuration scanning strategy and setting sweep parameter;On the other hand, subscriber management function (addition, delete and change authorized user);
Communication module, it is that the system service end carries out the certification of authorized user, the coordination of communication encryption system and analysis with client and handles information of transmission of both sides etc.;On the one hand, sweep parameter, the scanning target of client setting are submitted to service end by it;On the other hand, objective result service end scanned submits to client;Therefore this module will be related to the formulation of communication protocol, cryptographic protocol;
Result treatment module, according to the requirement of client, client is sent the result to immediately or the function of user is submitted to lettergram mode;Function of the backup scanning result to database service end (calling preservation and read module);It is multiple to same targeted scans in a short time to avoid, take the strategy for directly utilizing lastlook (in certain time);
Explanation module, mainly explain plug-in unit attack code function;In addition, also comprising all Database fields such as the plug-in unit numbering in processing plugin library, the descriptions of leak title, leak;Meanwhile when upgrading to the system, plugin library can be increased by this module, change operation;
The establishment and end of multi-process, multiple threads module, treatment progress and thread;Communication and control between treatment progress, between thread etc..
The above-described embodiments are merely illustrative of preferred embodiments of the present invention, and not the spirit and scope of the present invention are defined.On the premise of design concept of the present invention is not departed from; the all variations and modifications that ordinary people in the field makes to technical scheme; protection scope of the present invention all should be dropped into, the claimed technology contents of the present invention, has all been recorded in detail in the claims.
Claims (4)
- A kind of 1. Security Vulnerabilities Scanner System, it is characterised in that:Including distribution and Coordination module, and configuration module, communication module, result treatment module, explanation module, lifting module and multi-process, the multiple threads module being connected with distribution and Coordination module;Described its output end of result treatment module is connected by database interface with explanation module.
- 2. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The result treatment module is connected with results repository.
- 3. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The explanation module is connected with plugin library.
- 4. Security Vulnerabilities Scanner System according to claim 1, it is characterised in that:The configuration module, communication module and result treatment module are connected with client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610477502.2A CN107547473A (en) | 2016-06-27 | 2016-06-27 | A kind of Security Vulnerabilities Scanner System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610477502.2A CN107547473A (en) | 2016-06-27 | 2016-06-27 | A kind of Security Vulnerabilities Scanner System |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107547473A true CN107547473A (en) | 2018-01-05 |
Family
ID=60961362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610477502.2A Pending CN107547473A (en) | 2016-06-27 | 2016-06-27 | A kind of Security Vulnerabilities Scanner System |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107547473A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600371A (en) * | 2018-12-08 | 2019-04-09 | 公安部第三研究所 | A kind of network layer leakage location and method |
-
2016
- 2016-06-27 CN CN201610477502.2A patent/CN107547473A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600371A (en) * | 2018-12-08 | 2019-04-09 | 公安部第三研究所 | A kind of network layer leakage location and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8448238B1 (en) | Network security as a service using virtual secure channels | |
US20070066280A1 (en) | Connection management system, method and program | |
Chandia et al. | Security strategies for SCADA networks | |
CN111488595A (en) | Method for realizing authority control and related equipment | |
CN107733863B (en) | Log debugging method and device under distributed hadoop environment | |
CN104158767B (en) | A kind of network admittance device and method | |
US20080275843A1 (en) | Identifying an application user as a source of database activity | |
KR101877655B1 (en) | Intelligent firewall access rules | |
CN104601530A (en) | Implementing method and system for could security service | |
CN110430280B (en) | Account automatic login method and system, storage medium and cloud desktop server | |
WO2018160252A1 (en) | Determining security vulnerabilities in application programming interfaces | |
CN109213790A (en) | A kind of data circulation analysis method and system based on block chain | |
CN111585956B (en) | Website anti-brushing verification method and device | |
CN105871919A (en) | Network application firewall system and realization method thereof | |
EP4030802A1 (en) | Method and apparatus for managing subscription data | |
Cui et al. | IoT data management and lineage traceability: A blockchain-based solution | |
Zhang et al. | Overview of IoT security architecture | |
CN103957174A (en) | Method for semantic switch loose coupling system to process information | |
Kant et al. | Analysis of IoT security risks based on the exposure of the MQTT protocol | |
CN110099041A (en) | A kind of Internet of Things means of defence and equipment, system | |
CN105025548B (en) | A kind of the connection control method and device of SIM card | |
US8793782B1 (en) | Enforcing a health policy in a local area network | |
Ayedh M et al. | Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions | |
CN107547473A (en) | A kind of Security Vulnerabilities Scanner System | |
CN106537962A (en) | Method, device, and equipment for wireless network configuration, access, and visit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180105 |