CN115296865A - Shared missing scanning method under multi-network environment - Google Patents
Shared missing scanning method under multi-network environment Download PDFInfo
- Publication number
- CN115296865A CN115296865A CN202210846840.4A CN202210846840A CN115296865A CN 115296865 A CN115296865 A CN 115296865A CN 202210846840 A CN202210846840 A CN 202210846840A CN 115296865 A CN115296865 A CN 115296865A
- Authority
- CN
- China
- Prior art keywords
- scanning
- user
- task
- network
- missing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Abstract
The invention provides a common missed scanning method in a multi-network environment, and belongs to the field of network security. The common missed-scanning method comprises the steps that firstly, the same missed-scanning system is set for a plurality of networks; when a user is added in the missing scanning system, a network to which the user belongs is designated, and a network identifier is bound for the user; the missed-scanning system is added with data authority control, scanning tasks created by each user are mutually independent, and the user can only see the scanning task created by the user when logging in the missed-scanning system; when starting a scanning task, a user checks whether other users are in the scanning task in the missing scanning system; if yes, the current user adds the own scanning task into the scanning queue, and automatically starts the task starting process after other users in front of the queue finish scanning; if not, directly entering the starting process of the current scanning task; before the task is started, the missed scanning system is automatically switched into the corresponding network according to the network identification, and the scanning task is started. The invention saves cost and improves the efficiency of missed scan.
Description
Technical Field
The invention belongs to the field of network security, and particularly relates to a common missing scanning method in a multi-network environment.
Background
With the development of cloud computing, virtualization technology and network security, vulnerability scanning is required for hosts (virtual hosts or physical hosts) within multiple networks (virtual networks or physical networks) using vulnerability scanning software.
In the prior art, because each network is independent and a plurality of networks are not communicated with each other, a set of missing scanning system is independently deployed in each network when the vulnerability scanning is carried out, and users in different networks respectively log in the respective missing scanning systems to carry out the vulnerability scanning on the host computers in the networks. As shown in fig. 1, three networks (lan-1, lan-2, and lan-n, respectively) are isolated from each other, each network has three hosts (host 1, host 2, and host n, respectively) and one missing scan system, and users in different networks log in their respective missing scan systems to perform vulnerability scanning on their own network hosts. With the development of services, the number of lans may increase to hundreds or even thousands, and the number of hosts in each lan may also increase to hundreds or even thousands, so that if one missed scanning system is deployed in each network, a large number of missed scanning systems need to be deployed, which brings the following problems: firstly, hardware resources are wasted, hardware cost is increased, and each set of system for missing scanning needs to be specially deployed on one host; secondly, the management cost is increased, a user needs to manage and maintain a large number of missed-scanning systems at the same time, and particularly when the missed-scanning systems need to be upgraded, each machine needs to be upgraded one by one independently, so that time and labor are wasted; thirdly, the expansibility is poor, a set of missing scanning system needs to be deployed again when each network is added, and meanwhile, if a bug occurs in the missing scanning system, each machine needs to be repaired one by one independently.
Disclosure of Invention
In view of the above-mentioned defects or shortcomings in the prior art, the embodiments of the present invention provide a common missed scan method in a multi-network environment, which saves cost and improves missed scan efficiency.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
a common missed scanning method under a multi-network environment comprises the following steps:
step S1, setting the same missing scanning system for a plurality of networks;
s2, when a user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user;
s3, adding data authority control to the missing scanning system, enabling the scanning tasks created by each user to be mutually independent, and enabling the user to only see the scanning tasks created by the user when logging in the missing scanning system;
s4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the task starting process is automatically started after the scanning of other users before the queue is finished; if no other user is in the scanning task in the missing scanning system, directly entering the starting process of the current scanning task;
and S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identification of the network to which the user belongs, and then starting the scanning task in the corresponding network.
In the above scheme, the missing scan system is implemented by a host computer with a missing scan program installed.
In the above scheme, each network corresponds to a unique network identifier in a multi-network environment.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the common missed-scanning method under the multi-network environment only needs to deploy one set of missed-scanning system under the multi-network environment, only needs to manage and maintain one missed-scanning system, and only needs to upgrade one missed-scanning system if the system needs to be upgraded; when the leakage scanning system has a leakage, only one leakage scanning system needs to be subjected to leakage repairing; meanwhile, only one hardware resource needs to be allocated to deploy and install bug scanning, so that the cost is saved, and meanwhile, the miss scanning efficiency is improved.
Of course, it is not necessary for any product or method to achieve all of the above-described advantages at the same time for practicing the invention.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a diagram of a deployment of a missing scan system in the prior art;
FIG. 2 is a block diagram of a deployment of a common missed scan system in a multi-network environment according to an embodiment of the present invention;
FIG. 3 is a flowchart of a common missing scan method in a multi-network environment according to an embodiment of the present invention;
fig. 4 is a flow diagram of a missed scan service in an embodiment of the invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. It should be noted that the embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures. In the description of the present invention, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as merely or implying relative importance.
The embodiment of the invention provides a shared missing scanning method under a multi-network environment aiming at the problem that a plurality of missing scanning systems are required to be deployed under a plurality of network environments, the network deployment structure is readjusted, hidden switching among a plurality of networks is realized, and only one missing scanning system is required to be deployed no matter how many independent networks exist in the required network when the user is switched into the required network without perception, so that the number of hardware is reduced, the hardware cost is saved, the management cost is reduced, and the expansibility is increased.
Referring to fig. 2 and fig. 3, the common missed scan method in the multi-network environment according to the embodiment of the present invention includes the following steps:
and S1, setting the same missing scanning system for a plurality of networks.
In this step, the missing scan system is implemented by a host computer installed with a missing scan program.
And S2, when the user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user.
In this step, in a multi-network environment, each network corresponds to a unique network identifier for distinguishing other networks.
And S3, increasing data authority control by the missed-scan system, enabling the scanning tasks created by each user to be independent from each other, and enabling the user to only see the scanning tasks created by the user when logging in the missed-scan system.
S4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the current user automatically enters the scanning task starting process after the scanning of other users before the queue is finished; and if no other user in the missing scanning system is in the scanning task, directly entering the starting process of the current scanning task.
And S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identifier of the network to which the user belongs, and then starting the scanning task in the corresponding network.
According to the technical scheme, the common missing scanning method in the multi-network environment provided by the embodiment of the invention can reduce the need of deploying a plurality of missing scanning systems under a plurality of conventional independent networks to the situation that only one set of missing scanning system needs to be deployed, only one missing scanning system needs to be managed and maintained, and only one missing scanning system needs to be upgraded if the system needs to be upgraded; when the leakage scanning system has a leakage, only one leakage scanning system needs to be subjected to leakage repairing; meanwhile, only one hardware resource needs to be allocated to deploy installation bug scanning, so that the cost is saved, and the miss scanning efficiency is improved.
The invention is explained in more detail below by means of a specific example.
As shown in fig. 4, a user performs vulnerability scanning on multiple networks by using the common missing scanning method in the multi-network environment provided by the present invention, and the related objects include a current user (user 1), a missing scanning system (scan 1), and two independent network environments (lan 1, lan 2). When vulnerability scanning is carried out, the following operations are executed:
a user (user 1) logs in a missed scanning system (scan 1), and the scan1 queries and displays task data to which the user1 belongs according to the current user authority;
and the scan1 determines that the network environment to which the user1 belongs is lan1 or lan2 according to the network characteristics of the user1, and directly starts a scanning task to normally execute scanning initiated by the user1 as long as the current environment is the lan1 environment. If scan1 does not belong to lan1 currently, checking whether a scanning task initiated by other users (user-n) is scanning currently, if so, adding a new task into a scanning alignment, wherein the task state is in a waiting scanning state, and automatically starting a scanning task starting process after the scanning of other users is finished; if no other user of the system is scanning, the task start process is entered directly.
The entering scanning task starting process is as follows:
switching the scan1 network environment to a corresponding lan, which is lan1 in the embodiment;
a scanning task is performed.
The above description is only a preferred embodiment of the invention and an illustration of the applied technical principle and is not intended to limit the scope of the claimed invention but only to represent a preferred embodiment of the invention. It will be appreciated by those skilled in the art that the scope of the invention is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Claims (3)
1. A common missed scan method under a multi-network environment is characterized by comprising the following steps:
step S1, setting the same missing scanning system for a plurality of networks;
s2, when a user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user;
s3, adding data authority control to the missing scanning system, enabling the scanning tasks created by each user to be mutually independent, and enabling the user to only see the scanning tasks created by the user when logging in the missing scanning system;
s4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the task starting process is automatically started after the scanning of other users before the queue is finished; if no other user is in the scanning task in the missing scanning system, directly entering the starting process of the current scanning task;
and S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identifier of the network to which the user belongs, and then starting the scanning task in the corresponding network.
2. The method of claim 1, wherein the system is implemented by a host computer installed with a missing scan program.
3. The method of claim 1, wherein each network corresponds to a unique network id in a multi-network environment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210846840.4A CN115296865A (en) | 2022-07-05 | 2022-07-05 | Shared missing scanning method under multi-network environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210846840.4A CN115296865A (en) | 2022-07-05 | 2022-07-05 | Shared missing scanning method under multi-network environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115296865A true CN115296865A (en) | 2022-11-04 |
Family
ID=83824293
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210846840.4A Pending CN115296865A (en) | 2022-07-05 | 2022-07-05 | Shared missing scanning method under multi-network environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115296865A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106559391A (en) * | 2015-09-28 | 2017-04-05 | 中国移动通信集团公司 | A kind of method and device of vulnerability scanning |
CN109067813A (en) * | 2018-10-24 | 2018-12-21 | 腾讯科技(深圳)有限公司 | Network hole detection method, device, storage medium and computer equipment |
CN111353161A (en) * | 2020-03-11 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Vulnerability scanning method and device |
CN112417454A (en) * | 2020-11-03 | 2021-02-26 | 西安交大捷普网络科技有限公司 | Target distribution method of scanning task and vulnerability scanning system |
US20210185073A1 (en) * | 2019-12-13 | 2021-06-17 | Disney Enterprises, Inc. | Techniques for analyzing network vulnerabilities |
CN113672934A (en) * | 2021-08-09 | 2021-11-19 | 中汽创智科技有限公司 | Security vulnerability scanning system and method, terminal and storage medium |
-
2022
- 2022-07-05 CN CN202210846840.4A patent/CN115296865A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106559391A (en) * | 2015-09-28 | 2017-04-05 | 中国移动通信集团公司 | A kind of method and device of vulnerability scanning |
CN109067813A (en) * | 2018-10-24 | 2018-12-21 | 腾讯科技(深圳)有限公司 | Network hole detection method, device, storage medium and computer equipment |
US20210185073A1 (en) * | 2019-12-13 | 2021-06-17 | Disney Enterprises, Inc. | Techniques for analyzing network vulnerabilities |
CN111353161A (en) * | 2020-03-11 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Vulnerability scanning method and device |
CN112417454A (en) * | 2020-11-03 | 2021-02-26 | 西安交大捷普网络科技有限公司 | Target distribution method of scanning task and vulnerability scanning system |
CN113672934A (en) * | 2021-08-09 | 2021-11-19 | 中汽创智科技有限公司 | Security vulnerability scanning system and method, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2675127B1 (en) | Method and device for automatically migrating system configuration item | |
US20170331862A1 (en) | Method for accessing cloud service and access device | |
CN110798338B (en) | Edge cloud deployment method and device | |
US9100353B2 (en) | Cloud server for managing hostnames and IP addresses, and management method for the cloud server | |
US20070244999A1 (en) | Method, apparatus, and computer product for updating software | |
US8230416B2 (en) | System, method and article of manufacture for using shadow installations of software modules during distributed system upgrade | |
CN109391514B (en) | High-availability-based equipment deployment method, server, storage medium and device | |
CN112769965B (en) | IP address management and distribution method, device and system | |
CN109739622B (en) | Main/standby main control configuration synchronization method and device based on frame type equipment | |
CN112099913A (en) | Method for realizing safety isolation of virtual machine based on OpenStack | |
CN113127150A (en) | Rapid deployment method and device of cloud native system, electronic equipment and storage medium | |
CN115296848A (en) | Bastion machine system based on multi-local area network environment and bastion machine access method | |
CN101453473A (en) | Remote service system based on different operation systems and equipment thereof | |
CN113965548A (en) | Hardware drive updating method, system, equipment and medium of storage server | |
CN114443073A (en) | Device and method for rapidly deploying bare metal server | |
CN115296865A (en) | Shared missing scanning method under multi-network environment | |
CN109274532B (en) | Method, device and system for issuing policy, centralized control equipment and readable storage medium | |
CN108053288B (en) | Service arrangement issuing method and device | |
CN112003726B (en) | High-availability configuration method for rapidly deploying Beegfs management service nodes | |
CN105373477B (en) | Capacity testing method | |
CN114443295A (en) | Heterogeneous cloud resource management scheduling method, device and system | |
CN113568669A (en) | Service board card starting method based on orthogonal architecture, service board card and orthogonal equipment | |
CN113746676A (en) | Container cluster-based network card management method, device, equipment, medium and product | |
CN114157569A (en) | Cluster system and construction method and construction device thereof | |
CN110912965A (en) | Method and system for deploying Web server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |