CN115296865A - Shared missing scanning method under multi-network environment - Google Patents

Shared missing scanning method under multi-network environment Download PDF

Info

Publication number
CN115296865A
CN115296865A CN202210846840.4A CN202210846840A CN115296865A CN 115296865 A CN115296865 A CN 115296865A CN 202210846840 A CN202210846840 A CN 202210846840A CN 115296865 A CN115296865 A CN 115296865A
Authority
CN
China
Prior art keywords
scanning
user
task
network
missing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210846840.4A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruihe Yuntu Technology Co ltd
Original Assignee
Beijing Ruihe Yuntu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruihe Yuntu Technology Co ltd filed Critical Beijing Ruihe Yuntu Technology Co ltd
Priority to CN202210846840.4A priority Critical patent/CN115296865A/en
Publication of CN115296865A publication Critical patent/CN115296865A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The invention provides a common missed scanning method in a multi-network environment, and belongs to the field of network security. The common missed-scanning method comprises the steps that firstly, the same missed-scanning system is set for a plurality of networks; when a user is added in the missing scanning system, a network to which the user belongs is designated, and a network identifier is bound for the user; the missed-scanning system is added with data authority control, scanning tasks created by each user are mutually independent, and the user can only see the scanning task created by the user when logging in the missed-scanning system; when starting a scanning task, a user checks whether other users are in the scanning task in the missing scanning system; if yes, the current user adds the own scanning task into the scanning queue, and automatically starts the task starting process after other users in front of the queue finish scanning; if not, directly entering the starting process of the current scanning task; before the task is started, the missed scanning system is automatically switched into the corresponding network according to the network identification, and the scanning task is started. The invention saves cost and improves the efficiency of missed scan.

Description

Shared missing scanning method under multi-network environment
Technical Field
The invention belongs to the field of network security, and particularly relates to a common missing scanning method in a multi-network environment.
Background
With the development of cloud computing, virtualization technology and network security, vulnerability scanning is required for hosts (virtual hosts or physical hosts) within multiple networks (virtual networks or physical networks) using vulnerability scanning software.
In the prior art, because each network is independent and a plurality of networks are not communicated with each other, a set of missing scanning system is independently deployed in each network when the vulnerability scanning is carried out, and users in different networks respectively log in the respective missing scanning systems to carry out the vulnerability scanning on the host computers in the networks. As shown in fig. 1, three networks (lan-1, lan-2, and lan-n, respectively) are isolated from each other, each network has three hosts (host 1, host 2, and host n, respectively) and one missing scan system, and users in different networks log in their respective missing scan systems to perform vulnerability scanning on their own network hosts. With the development of services, the number of lans may increase to hundreds or even thousands, and the number of hosts in each lan may also increase to hundreds or even thousands, so that if one missed scanning system is deployed in each network, a large number of missed scanning systems need to be deployed, which brings the following problems: firstly, hardware resources are wasted, hardware cost is increased, and each set of system for missing scanning needs to be specially deployed on one host; secondly, the management cost is increased, a user needs to manage and maintain a large number of missed-scanning systems at the same time, and particularly when the missed-scanning systems need to be upgraded, each machine needs to be upgraded one by one independently, so that time and labor are wasted; thirdly, the expansibility is poor, a set of missing scanning system needs to be deployed again when each network is added, and meanwhile, if a bug occurs in the missing scanning system, each machine needs to be repaired one by one independently.
Disclosure of Invention
In view of the above-mentioned defects or shortcomings in the prior art, the embodiments of the present invention provide a common missed scan method in a multi-network environment, which saves cost and improves missed scan efficiency.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
a common missed scanning method under a multi-network environment comprises the following steps:
step S1, setting the same missing scanning system for a plurality of networks;
s2, when a user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user;
s3, adding data authority control to the missing scanning system, enabling the scanning tasks created by each user to be mutually independent, and enabling the user to only see the scanning tasks created by the user when logging in the missing scanning system;
s4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the task starting process is automatically started after the scanning of other users before the queue is finished; if no other user is in the scanning task in the missing scanning system, directly entering the starting process of the current scanning task;
and S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identification of the network to which the user belongs, and then starting the scanning task in the corresponding network.
In the above scheme, the missing scan system is implemented by a host computer with a missing scan program installed.
In the above scheme, each network corresponds to a unique network identifier in a multi-network environment.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the common missed-scanning method under the multi-network environment only needs to deploy one set of missed-scanning system under the multi-network environment, only needs to manage and maintain one missed-scanning system, and only needs to upgrade one missed-scanning system if the system needs to be upgraded; when the leakage scanning system has a leakage, only one leakage scanning system needs to be subjected to leakage repairing; meanwhile, only one hardware resource needs to be allocated to deploy and install bug scanning, so that the cost is saved, and meanwhile, the miss scanning efficiency is improved.
Of course, it is not necessary for any product or method to achieve all of the above-described advantages at the same time for practicing the invention.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a diagram of a deployment of a missing scan system in the prior art;
FIG. 2 is a block diagram of a deployment of a common missed scan system in a multi-network environment according to an embodiment of the present invention;
FIG. 3 is a flowchart of a common missing scan method in a multi-network environment according to an embodiment of the present invention;
fig. 4 is a flow diagram of a missed scan service in an embodiment of the invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. It should be noted that the embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures. In the description of the present invention, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as merely or implying relative importance.
The embodiment of the invention provides a shared missing scanning method under a multi-network environment aiming at the problem that a plurality of missing scanning systems are required to be deployed under a plurality of network environments, the network deployment structure is readjusted, hidden switching among a plurality of networks is realized, and only one missing scanning system is required to be deployed no matter how many independent networks exist in the required network when the user is switched into the required network without perception, so that the number of hardware is reduced, the hardware cost is saved, the management cost is reduced, and the expansibility is increased.
Referring to fig. 2 and fig. 3, the common missed scan method in the multi-network environment according to the embodiment of the present invention includes the following steps:
and S1, setting the same missing scanning system for a plurality of networks.
In this step, the missing scan system is implemented by a host computer installed with a missing scan program.
And S2, when the user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user.
In this step, in a multi-network environment, each network corresponds to a unique network identifier for distinguishing other networks.
And S3, increasing data authority control by the missed-scan system, enabling the scanning tasks created by each user to be independent from each other, and enabling the user to only see the scanning tasks created by the user when logging in the missed-scan system.
S4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the current user automatically enters the scanning task starting process after the scanning of other users before the queue is finished; and if no other user in the missing scanning system is in the scanning task, directly entering the starting process of the current scanning task.
And S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identifier of the network to which the user belongs, and then starting the scanning task in the corresponding network.
According to the technical scheme, the common missing scanning method in the multi-network environment provided by the embodiment of the invention can reduce the need of deploying a plurality of missing scanning systems under a plurality of conventional independent networks to the situation that only one set of missing scanning system needs to be deployed, only one missing scanning system needs to be managed and maintained, and only one missing scanning system needs to be upgraded if the system needs to be upgraded; when the leakage scanning system has a leakage, only one leakage scanning system needs to be subjected to leakage repairing; meanwhile, only one hardware resource needs to be allocated to deploy installation bug scanning, so that the cost is saved, and the miss scanning efficiency is improved.
The invention is explained in more detail below by means of a specific example.
As shown in fig. 4, a user performs vulnerability scanning on multiple networks by using the common missing scanning method in the multi-network environment provided by the present invention, and the related objects include a current user (user 1), a missing scanning system (scan 1), and two independent network environments (lan 1, lan 2). When vulnerability scanning is carried out, the following operations are executed:
a user (user 1) logs in a missed scanning system (scan 1), and the scan1 queries and displays task data to which the user1 belongs according to the current user authority;
and the scan1 determines that the network environment to which the user1 belongs is lan1 or lan2 according to the network characteristics of the user1, and directly starts a scanning task to normally execute scanning initiated by the user1 as long as the current environment is the lan1 environment. If scan1 does not belong to lan1 currently, checking whether a scanning task initiated by other users (user-n) is scanning currently, if so, adding a new task into a scanning alignment, wherein the task state is in a waiting scanning state, and automatically starting a scanning task starting process after the scanning of other users is finished; if no other user of the system is scanning, the task start process is entered directly.
The entering scanning task starting process is as follows:
switching the scan1 network environment to a corresponding lan, which is lan1 in the embodiment;
a scanning task is performed.
The above description is only a preferred embodiment of the invention and an illustration of the applied technical principle and is not intended to limit the scope of the claimed invention but only to represent a preferred embodiment of the invention. It will be appreciated by those skilled in the art that the scope of the invention is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.

Claims (3)

1. A common missed scan method under a multi-network environment is characterized by comprising the following steps:
step S1, setting the same missing scanning system for a plurality of networks;
s2, when a user is added into the missing scanning system, the network to which the user belongs is designated, and the network identifier of the network to which the user belongs is bound for the user;
s3, adding data authority control to the missing scanning system, enabling the scanning tasks created by each user to be mutually independent, and enabling the user to only see the scanning tasks created by the user when logging in the missing scanning system;
s4, when starting the scanning task, the user checks whether other users are in the scanning task in the scanning missing system; if other users are scanning, the current user adds the own scanning task into the scanning queue, the task state is in a waiting scanning state, and the task starting process is automatically started after the scanning of other users before the queue is finished; if no other user is in the scanning task in the missing scanning system, directly entering the starting process of the current scanning task;
and S5, before the task is started, automatically switching the missed scanning system into the corresponding network according to the network identifier of the network to which the user belongs, and then starting the scanning task in the corresponding network.
2. The method of claim 1, wherein the system is implemented by a host computer installed with a missing scan program.
3. The method of claim 1, wherein each network corresponds to a unique network id in a multi-network environment.
CN202210846840.4A 2022-07-05 2022-07-05 Shared missing scanning method under multi-network environment Pending CN115296865A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210846840.4A CN115296865A (en) 2022-07-05 2022-07-05 Shared missing scanning method under multi-network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210846840.4A CN115296865A (en) 2022-07-05 2022-07-05 Shared missing scanning method under multi-network environment

Publications (1)

Publication Number Publication Date
CN115296865A true CN115296865A (en) 2022-11-04

Family

ID=83824293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210846840.4A Pending CN115296865A (en) 2022-07-05 2022-07-05 Shared missing scanning method under multi-network environment

Country Status (1)

Country Link
CN (1) CN115296865A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559391A (en) * 2015-09-28 2017-04-05 中国移动通信集团公司 A kind of method and device of vulnerability scanning
CN109067813A (en) * 2018-10-24 2018-12-21 腾讯科技(深圳)有限公司 Network hole detection method, device, storage medium and computer equipment
CN111353161A (en) * 2020-03-11 2020-06-30 腾讯科技(深圳)有限公司 Vulnerability scanning method and device
CN112417454A (en) * 2020-11-03 2021-02-26 西安交大捷普网络科技有限公司 Target distribution method of scanning task and vulnerability scanning system
US20210185073A1 (en) * 2019-12-13 2021-06-17 Disney Enterprises, Inc. Techniques for analyzing network vulnerabilities
CN113672934A (en) * 2021-08-09 2021-11-19 中汽创智科技有限公司 Security vulnerability scanning system and method, terminal and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559391A (en) * 2015-09-28 2017-04-05 中国移动通信集团公司 A kind of method and device of vulnerability scanning
CN109067813A (en) * 2018-10-24 2018-12-21 腾讯科技(深圳)有限公司 Network hole detection method, device, storage medium and computer equipment
US20210185073A1 (en) * 2019-12-13 2021-06-17 Disney Enterprises, Inc. Techniques for analyzing network vulnerabilities
CN111353161A (en) * 2020-03-11 2020-06-30 腾讯科技(深圳)有限公司 Vulnerability scanning method and device
CN112417454A (en) * 2020-11-03 2021-02-26 西安交大捷普网络科技有限公司 Target distribution method of scanning task and vulnerability scanning system
CN113672934A (en) * 2021-08-09 2021-11-19 中汽创智科技有限公司 Security vulnerability scanning system and method, terminal and storage medium

Similar Documents

Publication Publication Date Title
EP2675127B1 (en) Method and device for automatically migrating system configuration item
US20170331862A1 (en) Method for accessing cloud service and access device
CN110798338B (en) Edge cloud deployment method and device
US9100353B2 (en) Cloud server for managing hostnames and IP addresses, and management method for the cloud server
US20070244999A1 (en) Method, apparatus, and computer product for updating software
US8230416B2 (en) System, method and article of manufacture for using shadow installations of software modules during distributed system upgrade
CN109391514B (en) High-availability-based equipment deployment method, server, storage medium and device
CN112769965B (en) IP address management and distribution method, device and system
CN109739622B (en) Main/standby main control configuration synchronization method and device based on frame type equipment
CN112099913A (en) Method for realizing safety isolation of virtual machine based on OpenStack
CN113127150A (en) Rapid deployment method and device of cloud native system, electronic equipment and storage medium
CN115296848A (en) Bastion machine system based on multi-local area network environment and bastion machine access method
CN101453473A (en) Remote service system based on different operation systems and equipment thereof
CN113965548A (en) Hardware drive updating method, system, equipment and medium of storage server
CN114443073A (en) Device and method for rapidly deploying bare metal server
CN115296865A (en) Shared missing scanning method under multi-network environment
CN109274532B (en) Method, device and system for issuing policy, centralized control equipment and readable storage medium
CN108053288B (en) Service arrangement issuing method and device
CN112003726B (en) High-availability configuration method for rapidly deploying Beegfs management service nodes
CN105373477B (en) Capacity testing method
CN114443295A (en) Heterogeneous cloud resource management scheduling method, device and system
CN113568669A (en) Service board card starting method based on orthogonal architecture, service board card and orthogonal equipment
CN113746676A (en) Container cluster-based network card management method, device, equipment, medium and product
CN114157569A (en) Cluster system and construction method and construction device thereof
CN110912965A (en) Method and system for deploying Web server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination