CN107872459A - A kind of scanning system of Network Security Vulnerabilities - Google Patents

A kind of scanning system of Network Security Vulnerabilities Download PDF

Info

Publication number
CN107872459A
CN107872459A CN201711103694.1A CN201711103694A CN107872459A CN 107872459 A CN107872459 A CN 107872459A CN 201711103694 A CN201711103694 A CN 201711103694A CN 107872459 A CN107872459 A CN 107872459A
Authority
CN
China
Prior art keywords
scanning
engine
hand
network
network security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711103694.1A
Other languages
Chinese (zh)
Inventor
李永祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Yuezhong Software Technology Co Ltd
Original Assignee
Xi'an Yuezhong Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Yuezhong Software Technology Co Ltd filed Critical Xi'an Yuezhong Software Technology Co Ltd
Priority to CN201711103694.1A priority Critical patent/CN107872459A/en
Publication of CN107872459A publication Critical patent/CN107872459A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of scanning system of Network Security Vulnerabilities,The hardware core of hand-held scanner engine is strongARM operation platforms,CF network interfaces are connected by strongARM buses,And ICP/IP protocol is installed and sends Hidden Danger Detection packet to main frame,Leak is judged whether by being scanned response of the equipment to detection bag,With host side bi-directional data transmission is completed using communication module,And the program at active host end,Host side utilizes its scanning result generation form simultaneously,Scanning engine is carried out componentization encapsulation by system,Many scanning motions are allow to be multiplexed in different Hole Detections,Hand-held scanner system is divided into two hierarchical structures of scanning engine and vulnerability database,And encapsulation process is done to hardware and network service in scanning engine,Componentization encapsulated object is some functional modules,Software configuration,Software systems model and software document,The present invention realizes the function of removable webmaster,The realization of Hardware technology makes the operation of Network Security Vulnerabilities scanning system simpler,It is more convenient and more practical.

Description

A kind of scanning system of Network Security Vulnerabilities
Technical field
The present invention relates to computer network field, more particularly to a kind of scanning system of Network Security Vulnerabilities.
Background technology
The popularization of computer and the development of internet, it is increasingly becoming the new paragon of people's live and work.Along with net The development of network, constructing for network security is also indispensable.Existing hidden network danger scanning product is mainly software installation side Formula and the class of frame mode two.The hidden network danger product of software installation mode is there is some shortcomings, such as:(1)Inherently safe protects Ability is relatively low, easily the modification by malicious user and illegal utilization;(2)The installation of the product of software mode and use process are all Specific platform is needed just to be smoothed out;(3)The product of software mode scans the goal systems of cross-network segment in use, Due to the strobe utilities such as route, fire wall be present, the speed and efficiency of scanning will be substantially reduced.And the hidden network danger of frame product Product is there is also in place of some shortcomings, such as:(1)The hidden network danger small product size of frame mode is larger, it has not been convenient to mobile;Simultaneously The goal systems of cross-network segment is scanned in use, due to the strobe utilities such as route, fire wall be present, will be substantially reduced The speed and efficiency of scanning;(2)The product interactivity of frame mode is poor.
The content of the invention
In order to overcome the defect of above-mentioned prior art, it is an object of the invention to provide a kind of scanning of Network Security Vulnerabilities System, security breaches detection can be carried out to computer in network or the network equipment, provide the advantages of risk assessment by having.
To reach above-mentioned purpose, technical scheme is as follows:
A kind of scanning system of Network Security Vulnerabilities, including hand-held scanner engine, the hardware core base of hand-held scanner engine In strongARM operation platforms, CF network interfaces are connected by strongARM buses, and ICP/IP protocol is installed and sent out to main frame Hidden Danger Detection packet is sent, leak is judged whether by being scanned response of the equipment to detection bag, and to different leaks The judgement of item is combined using the method for script to detection bag, so as to reach the unification of flexibility and stability.
Hand-held scanner engine completes the function of bi-directional data transmission, and active host end with host side using communication module Program, while host side using hand-held scanner engine scanning result generation form.
Scanning engine is carried out componentization encapsulation by system, many scanning motions is obtained in different Hole Detections Multiplexing, improves the reusability of software and the reliability of whole system.
Hand-held scanner system is divided into two hierarchical structures of scanning engine and vulnerability database, and in scanning engine to hardware and Encapsulation process has been done in network service, engine is possessed general and efficient ability.
Componentization encapsulated object is some functional modules, software configuration, software systems model and software document, object-oriented In system, component can be packaged with the form of class and object, and fairly large component can be retouched by the polymerization of component State, numerous functional modules has been carried out componentization encapsulation by the system, makes the characteristic and work(of multiple systems of even running It can be inherited and be multiplexed, system is had abundant function while high stability is kept, with system application Popularization, the accumulation of component is more and more, there is provided function also can more enrich.
Network defect scanning system stresses to occur before security incident this as automated network security risk-assessment tools In one stage, its target scanned can be the various objects such as work station, server, interchanger, database application, pass through simulating black The gimmick of objective attack, to carrying out security breaches and Vulnerability scan by check system, Risk Assessment Report is submitted, and corresponding rectification is provided Measure, find and patch a leak prior to hacker, prevent trouble before it happens, preventative safety inspection exposes existing net to greatest extent Potential safety hazard present in network system, coordinate effective measures to rectify and reform, the operation risk of network system can be down to most It is low.
The present invention realizes the function of removable webmaster, and the realization of Hardware technology operates Network Security Vulnerabilities scanning system Simpler, more convenient and more practical, it has the following advantages that:
(1)Hand-held product scanning software is fully cured, and has the safeguard measure of a variety of attack resistances, can resist other networks peace The attack that full software can not be born, makes software inherently safe preferably be ensured;
(2)Hand-held product does not need extra operation platform, its mobility having, and user can bypass router, fire prevention Wall etc., it can thus accelerate the sweep speed and efficiency of cross-network segment.
Embodiment
With reference to embodiment, the present invention will be further described in detail.
A kind of scanning system of Network Security Vulnerabilities, the hardware core of network defect scanning system be using strongARM as Operation platform, the operation platform of basic unit is Embedded Linux s operating systems, the product of hand-held not only increase product from Body security protection, and the function of mobile network manager can be realized, the strobe utilities such as router, fire wall can be bypassed, will be dropped significantly The speed and efficiency of low scanning.The product operation that hand-held product also solves software installation mode needs particular platform to be associated Deficiency.
Software for Design employs state-of-the-art stratification software architecture, using plug-in unit and script mode, framework is clear, It is stable;The upgrading of vulnerability database does not interfere with the stabilization of program, so that advanced and reliability is perfectly unified. Each renewal is simply updated some plug-in units and script, without totally being modified to program, ensure that the stabilization of program. Each plug-in unit encapsulates the means of testing of one or more leak, and main scanning program is performed by calling the method for plug-in unit Scanning.Only adding new plug-in unit can just make software increase New function, scan more leaks.Specification is write in plug-in unit to announce In the case of, user or third party even oneself can write plug-in unit to expand the function of software.This technology makes soft simultaneously The upgrade maintenance of part all becomes relatively easy, and has very strong autgmentability.Script that is to say a kind of computer language, be one The plug-in part technology of kind higher level, user can carry out expansion software functions using special script.These script grammers lead to It is often fairly simple easy to learn, a simple test often is customized with tens line code cans, new test item is added for software. The use of script, the programing work for writing new plug-in unit is simplified, makes the work of expansion software functions become to be more prone to, It is more interesting.
The Security Vulnerability Database that international CVE standards are established is based entirely on, and can be with international newest standards by network upgrade It is synchronous.Help user to find out in time and make up existing leak and hidden danger.Each leak item in vulnerability database, has one to sweep It is corresponding to retouch script.Scanning engine explain perform this script when, according to the information described in script, in component invoking storehouse Corresponding component, sends database in a manner of various combination.
Hand-held product can realize mobile network manager, carry out distributed testing, and user can concentrate to scanning result The analysis and management of formula.Facilitate user and unified network-wide security policy is specified according to distributed scanning result.

Claims (4)

1. a kind of scanning system of Network Security Vulnerabilities, including hand-held scanner engine, it is characterised in that hand-held scanner engine Hardware core be based on strongARM operation platforms, CF network interfaces are connected by strongARM buses, and TCP/IP are installed Agreement sends Hidden Danger Detection packet to main frame, and leak is judged whether by being scanned response of the equipment to detection bag, And the judgement to different leak items is combined using the method for script to detection bag, so as to reach flexibility and stability It is unified;
Hand-held scanner engine completes the function of bi-directional data transmission, and the journey at active host end with host side using communication module Sequence, while host side utilizes the scanning result generation form of hand-held scanner engine.
A kind of 2. scanning system of Network Security Vulnerabilities according to claim 1, it is characterised in that:System is by scanning engine Componentization encapsulation is carried out, many scanning motions is multiplexed in different Hole Detections.
A kind of 3. scanning system of Network Security Vulnerabilities according to claim 1, it is characterised in that:Hand-held scanner system It is divided into two hierarchical structures of scanning engine and vulnerability database, and encapsulation process has been done to hardware and network service in scanning engine.
A kind of 4. scanning system of Network Security Vulnerabilities according to claim 1, it is characterised in that:Componentization encapsulated object For some functional modules, software configuration, software systems model and software document.
CN201711103694.1A 2017-11-10 2017-11-10 A kind of scanning system of Network Security Vulnerabilities Pending CN107872459A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711103694.1A CN107872459A (en) 2017-11-10 2017-11-10 A kind of scanning system of Network Security Vulnerabilities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711103694.1A CN107872459A (en) 2017-11-10 2017-11-10 A kind of scanning system of Network Security Vulnerabilities

Publications (1)

Publication Number Publication Date
CN107872459A true CN107872459A (en) 2018-04-03

Family

ID=61753765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711103694.1A Pending CN107872459A (en) 2017-11-10 2017-11-10 A kind of scanning system of Network Security Vulnerabilities

Country Status (1)

Country Link
CN (1) CN107872459A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225057A (en) * 2019-06-24 2019-09-10 杭州安恒信息技术股份有限公司 A kind of method for detecting virus of intelligent terminal, device, equipment and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225057A (en) * 2019-06-24 2019-09-10 杭州安恒信息技术股份有限公司 A kind of method for detecting virus of intelligent terminal, device, equipment and system

Similar Documents

Publication Publication Date Title
US11526610B2 (en) Peer-to-peer network for blockchain security
CN106899410B (en) A kind of method and device of equipment identities certification
CN106933660A (en) The implementation method of application process keep-alive under a kind of Android platform
CN103905451B (en) System and method for trapping network attack of embedded device of smart power grid
CN106850690B (en) Honeypot construction method and system
CN109922160A (en) A kind of terminal security cut-in method, apparatus and system based on electric power Internet of Things
CN105991595A (en) Network security protection method and device
CN104244281A (en) Base station detection method and base station detection device
CN104219218A (en) Active safety defense method and active safety defense device
CN109525397A (en) A kind of block chain and method towards SDN network stream rule safety guarantee
Fan et al. Versatile virtual honeynet management framework
CN109167780A (en) A kind of method, equipment, system and the medium of the access of control resource
CN113014589A (en) 5G communication safety test method and system
CN102045310B (en) Industrial Internet intrusion detection as well as defense method and device
CN106161171A (en) A kind of method and apparatus setting up Network example
CN104038488A (en) System network safety protection method and device
CN106209799A (en) A kind of method, system and dynamic firewall realizing dynamic network protection
US11457046B2 (en) Distributed network resource security access management system and user portal
CN107872459A (en) A kind of scanning system of Network Security Vulnerabilities
CN108111516A (en) Based on WLAN safety communicating method, device and electronic equipment
CN108881460A (en) A kind of implementation method and realization device of cloud platform unified monitoring
CN112866036B (en) Network flow simulation method and system of cloud computing platform and computer storage medium
CN108900328A (en) A kind of electricity grid network data safety test macro and method
CN109474567A (en) DDOS attack source tracing method, device, storage medium and electronic equipment
CN206181087U (en) Active leak detecting system towards industrial control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180403