CN102082659B - Vulnerability scanning system oriented to safety assessment and processing method thereof - Google Patents

Vulnerability scanning system oriented to safety assessment and processing method thereof Download PDF

Info

Publication number
CN102082659B
CN102082659B CN200910112916.5A CN200910112916A CN102082659B CN 102082659 B CN102082659 B CN 102082659B CN 200910112916 A CN200910112916 A CN 200910112916A CN 102082659 B CN102082659 B CN 102082659B
Authority
CN
China
Prior art keywords
module
client
server end
scanning
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200910112916.5A
Other languages
Chinese (zh)
Other versions
CN102082659A (en
Inventor
刘祥南
吴鸿伟
高静峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN200910112916.5A priority Critical patent/CN102082659B/en
Publication of CN102082659A publication Critical patent/CN102082659A/en
Application granted granted Critical
Publication of CN102082659B publication Critical patent/CN102082659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a vulnerability scanning system oriented to safety assessment and a processing method thereof. The system provided by the invention comprises a server side and a client side which are of a C/S (client/server) structure; the server side operates on a Unix or Linux platform, and the client side operates on a Windows platform; the server side comprises a client side verification module, a scanning engine service module, a scheduling process module, an invasion detecting module and the like; the client side comprises a server verification module, a scanning configuration module, a pre-warning module, an evaluation algorithm module, a scanning report processing module, a vulnerability expansion and Chinesization module and the like; and according to the invention, the vulnerability scanning system and the invasion detection system are combined, the pre-warning function and scheduling function are introduced, thus the system can carry out vulnerability scanning and safety assessment selectively and purposively according to the requirements of users, and a relatively objective and accurate vulnerability scanning report forms.

Description

A kind of vulnerability scanning system of network-oriented security evaluation and processing method thereof
Technical field
The present invention relates to a kind of vulnerability scanning system, particularly relate to a kind of vulnerability scanning system and processing method thereof of network-oriented security evaluation.
Background technology
At present, along with the develop rapidly of computer network and mechanics of communication, network security problem also becomes increasingly conspicuous.In the face of various network events and safety problem, we profoundly feel importance and the urgency of network security assessment.How to assess? what technology to realize security evaluation by? this more and more causes people's extensive concern and attention, and becomes the hot issue of field of information security technology research.
In the face of network security problem, by large component analysis, can find, hacker and virus are normally parasitic by security breaches and penetrate in goal systems, and system is carried out to certain modification and destruction.As long as therefore can find the existing security breaches of system and repair in time, just can effectively resist most of hacker and viral attack.The function of vulnerability scanning system is carried out safety detection for computer or other network host equipment exactly, with the security breaches of finding out the potential safety hazard existing and finding to be utilized by hacker, make network manager know in advance the fragility place of network, and adopt remedial measures in time and guarantee the safety of network system.
The architectural principles block diagram of the vulnerability scanning system of prior art is shown in Figure 1: the most of C/S model that adopts of this vulnerability scanning system, and this pattern is mainly by client 1 ' and server end 2 ' form; Wherein, client 1 ' by security evaluation module 11 ', scanning configuration module 12 ' and result Report Server Management module 13 ' form, server end 2 ' by scanning engine 21 ', vulnerability database 22 ' and plugin library 23 ' form; Client 1 ' and server end 2 ' between by encrypted tunnel 3 ' realize data transmission; Server end 2 ' be scanned network 4 ' be connected.During this work pattern, by client 1 ' by the configuration of scanning configuration module 12 ' scan, and by scan request file send to server end 2 '; Server end 2 ' scanning engine 21 ' call corresponding plug-in unit to being scanned network 4 ' scan according to scan profile information, and by the result from being scanned network 4 ' return and vulnerability database 22 ' information mate to determine whether to exist corresponding leak, then scanning result is returned to client 1 '; Client 1 ' by the security evaluation module 11 ' scanning result returning is analyzed, and complete to be scanned network 4 ' security evaluation work; Finally by client 1 ' result Report Server Management module 13 ' scanning result is processed.
Although the structural principle of this vulnerability scanning system of prior art is comparatively simple, but it is comparatively significantly not enough to exist some: first, it is more passive that this pattern is carried out vulnerability scanning, be generally that user just carries out vulnerability scanning while needing the fail safe of detection system, can not find in time the leak of system; Secondly, this pattern can not arrange an efficient scheduling mechanism to scan task, realizes timing scan; The 3rd, this pattern is all generally leak grade to be divided into high, medium and low, and then a simple weights of giving, finally calculate and get weighted average again, comparatively coarse because of algorithm, cause assessment report error large; The 4th, this pattern does not have warning function, the leak that generally scans a system or network need to be waited for the longer time, user just carries out the repairing of leak after waiting until the whole end of scan, if had this time for the invasion of corresponding leak, attack into, user cannot detect.
Summary of the invention
The object of the invention is to overcome the deficiency of prior art, a kind of vulnerability scanning system and processing method thereof of network-oriented security evaluation are provided, the weak point that it exists on framework and assessment algorithm according to traditional vulnerability scanning system, a more rational scanning system model is proposed, adopt the assessment algorithm of fuzzy mathematics to carry out security evaluation to scanning result simultaneously, thereby improve the accuracy of assessment.
The technical solution adopted for the present invention to solve the technical problems is: a kind of vulnerability scanning system of network-oriented security evaluation, comprise the server end and the client that adopt C/S framework, this server end runs on Unix or Linux platform, and this client runs on windows platform;
This server end, comprising:
Scanning engine service module, is used for accepting the request of client, carries out scan task;
Plugin library, is used for the plug-in unit of memory check leak;
Vulnerability database, is used for storing leak data;
Scan history memory block, is used for memory scanning historical record data;
In server end: scanning engine service module respectively with plugin library, vulnerability database, scan history memory block is connected, scanning engine service module calls plug-in unit according to the request of client and from scan history memory block, reads corresponding scan history objective network is scanned from plugin library, and new scanning information is write in scan history memory block, scanning result is mated with vulnerability database and sees whether find leak, finally scanning result is sent to client simultaneously;
This client, comprising:
Scanning configuration module, provides an interface, allows user be configured the information of scan session, then configuration information is formed to sweep parameter file, and encryption sends to server end;
Scan report processing module, according to the vulnerability information in Chinese vulnerability database and scanning result Information generation scan report;
Assessment algorithm module, carries out computational analysis according to preset algorithm to scanning result, and forms security evaluation report;
Scanning result storehouse, is used for memory scanning result data;
Chinese vulnerability database, is used for storing Chinese leak data;
In client: assessment algorithm module is connected with scanning result storehouse, assessment algorithm module is transferred scanning result and according to preset algorithm, scanning result is carried out to computational analysis from scanning result storehouse, thereby forms security evaluation report; Scan report processing module is connected with Chinese vulnerability database, scanning result storehouse respectively, from Chinese vulnerability database, extracts vulnerability information, transfers scanning result information from scanning result storehouse, and generates scan report.
Described server end, also comprises:
Dispatching process module, is used for accepting the request of client, to scanning engine service module, sends driver sweep instruction;
Intrusion detection module, is used for monitoring network condition, judges whether network has extremely, starts scanning when abnormal having;
Rule base, is used for storage rule data;
In server end: dispatching process module is connected with scanning engine service module, dispatching process module driver sweep engine service module is carried out scan task; Intrusion detection module is connected with rule base, and intrusion detection module is monitored network condition and the rule in snoop results and rule base is compared to judge whether network occurs extremely;
Described client, also comprises:
Warning module, the startup scan instruction sending according to the intrusion detection module of server end produces alarm, by user, current network is scanned or the dispatching process module that automatically starts server end scans;
When the intrusion detection module of server end notes abnormalities, the intrusion detection module of server end sends startup scan instruction to the warning module of client, the warning module of client produces warning message, and the dispatching process module that automatically starts as required server end scans.
Described server end, also comprises:
Client validation module, the request that is used for accepting client is verified client certificate, and is sent server end certificate to client;
User certificate stack room, are used for storing subscriber information and client certificate;
In server end: client validation module is connected with user certificate stack room, client validation module is by the checking of comparing of the client certificate in the checking request of the client of acceptance and user certificate stack room;
Described client, also comprises:
Server end authentication module, is used for sending client certificate to server end, and reception server end certificate;
Certificate of service storehouse, is used for storage server information and server end certificate;
In client: server end authentication module is connected with certificate of service storehouse, server end authentication module is by the checking of comparing of the server end certificate in the server end certificate of reception and certificate of service storehouse.
Described server end, also comprises:
Leak expands and Chinesizing module, is used for setting up Chinese vulnerability database;
In server end: leak expansion is connected with Chinese vulnerability database with Chinesizing module.
The processing method of the vulnerability scanning of a kind of network-oriented security evaluation of the present invention, comprises following process:
Client is by being used certificate verification to be connected to the server end of appointment, and server end passes through client certificate;
Client terminal start-up scanning configuration module is configured and configuration information is sent to server end the network that will scan;
Server end starts the work of scanning engine service module, and the scanning engine service module of server end calls the plug-in unit in plugin library according to configuration parameter and reads the corresponding scan history in scan history memory block the network of appointment is scanned;
The scanning engine service module of server end writes new scanning information in scan history memory block; The scanning engine service module of server end mates to see whether find leak, finally scanning result is sent to client scanning result with vulnerability database simultaneously;
The storage of the scanning result of server end is accepted in the scanning result storehouse of client;
The assessment algorithm module of client is obtained scanning result information from scanning result storehouse, and according to preset algorithm, scanning result is carried out to computational analysis, and then forms security evaluation report;
The scan report processing module of client, according to the scanning result information of obtaining in the vulnerability information in Chinese vulnerability database and scanning result storehouse, generates scan report;
The intrusion detection module of server end, after server operation, is just caught the situation of packet on monitored network constantly, mates with the rule in rule base, judges on network, whether there are abnormal conditions;
When network has abnormal conditions, just notify the warning module in client, warning module produces reports to the police, by user, current network is scanned to or automatically start the dispatching process module of server end, by dispatching process module driver sweep engine service module, whole network is scanned.
The invention has the beneficial effects as follows: due to vulnerability scanning system and intruding detection system are combined, and introduce warning function and scheduling feature, make this vulnerability scanning system according to user's needs, to have selection on purpose the network that will assess to be carried out to vulnerability scanning and security evaluation; Due to the safety evaluation method of introducing based on fuzzy mathematics, and the method can carry out more objective a, security evaluation accurately to scanning result, makes whole scan report result more accurate.This system can be carried out system vulnerability scanning automatically, forms scan report result intuitively, can effectively prevent invasion simultaneously, and during in conjunction with relevant expertise value, can make whole network security assessment result more accurate and authoritative.
Below in conjunction with drawings and Examples, the present invention is described in further detail; But vulnerability scanning system and the processing method thereof of a kind of network-oriented security evaluation of the present invention are not limited to embodiment.
Accompanying drawing explanation
Fig. 1 is the structural principle block diagram of the vulnerability scanning system of prior art;
Fig. 2 is the structural principle block diagram of vulnerability scanning system of the present invention;
Fig. 3 is the flow chart of warning module of the present invention;
Fig. 4 is sweep parameter file content and the transport process schematic diagram of scanning configuration module of the present invention.
Embodiment
Embodiment, shown in Figure 2, the vulnerability scanning system of a kind of network-oriented security evaluation of the present invention, its vulnerability scanning system comprises server end 1 and the client 2 that adopts C/S framework, this server end 1 runs on Unix or Linux platform, and this client 2 runs on windows platform;
This server end 1, comprising:
Scanning engine service module 16, is used for accepting the request of client 2, carries out scan task; The Main Function of scanning engine service module 16 is to be responsible for from plugin library, choosing specific plug-in unit according to user's customization, coordinates respectively to scan the relation between plug-in unit, carries out scanning imaging system, result is deposited in scan history, and be responsible for sending to client;
Client validation module 19, the request that is used for accepting client 2 is verified client certificate, and is sent server end certificates to client 2; When server end 1 starts operation first, must carry out user profile setting, rule server setting, can produce a server end certificate afterwards; This module stores the certificate of user profile and client 2, supports that user adopts password or certificate game server;
Dispatching process module 17, is used for accepting the request of client 2, to scanning engine service module 16, sends driver sweep instruction; Configuration according to the user from client 2 to scan task schedule information, this module can regularly be carried out corresponding scan task, and automatically preserves scanning result;
Intrusion detection module 18, is used for monitoring network condition, judges whether network has extremely, starts scanning when abnormal having; This module is mainly catch constantly the situation of packet on monitored network and analyze, and mates, thereby judges on network, whether there are abnormal conditions, and start in time dispatching process module with the rule in rule base;
Plugin library 11, is used for the plug-in unit of memory check leak; Wherein, plug-in unit and leak are man-to-man relations, and a plug-in unit is responsible for checking a leak, and all plug-in units all leave in plugin library 11, and plug-in unit organizes together according to classification separately;
Vulnerability database 12, is used for storing leak data; When this model is carried out external scan, the information of returning from destination host or network and the information this vulnerability database 12 are matched, with this, judge whether destination host or network exist corresponding leak;
Rule base 13, is used for storage rule data;
User certificate stack room 14, are used for storing subscriber information and client certificate;
Scan history memory block 15, is used for memory scanning historical record data;
In server end 1: scanning engine service module 16 respectively with plugin library 11, vulnerability database 12, scan history memory block 15 is connected, scanning engine service module 16 calls plug-in unit and from scan history memory block 15, reads corresponding scan history objective network 3 is scanned from plugin library 11 according to the request of client 2, and new scanning information is write in scan history memory block 15, scanning result is mated and sees whether find leak with vulnerability database 12, finally scanning result is sent to client 2 simultaneously; Dispatching process module 17 is connected with scanning engine service module 16, and dispatching process module 17 driver sweep engine service modules 16 are carried out scan task; Intrusion detection module 18 is connected with rule base 13, and 18 pairs of network condition of intrusion detection module are monitored and the rule of 13 li of snoop results and rule bases is compared to judge whether objective network 3 occurs extremely; Client validation module 19 is connected with user certificate stack room 14, and client validation module 19 is by the checking of comparing of the client certificate in the checking request of the client of acceptance 2 and user certificate stack room 14;
This client 2, comprising:
Server end authentication module 205, is used for sending client certificate to server end 1, and reception server end certificate; Client 2 first connections during to server, can and be kept at client from server downloadable authentication; When client 2 is connected with server end 1, all want the server end certificate stored on checking client whether consistent with the certificate on current server end, while only having the two consistent, connecting could success;
Warning module 203, the startup scan instruction sending according to the intrusion detection module 18 of server end 1 produces alarm, by user, current network is scanned or the dispatching process module 17 that automatically starts server end 1 scans;
Scanning configuration module 201, provides an interface, allows user be configured the information of scan session, then configuration information is formed to sweep parameter file, and encryption sends to server end 1;
Scan report processing module 208, according to the vulnerability information in Chinese vulnerability database and scanning result Information generation scan report 209; Its scan report form has the forms such as txt, html; In order to make scan report visualize more, can also show leak hazard rating and leak family information with curve chart, pie chart and block diagram;
Leak expands and Chinesizing module 204, is used for setting up Chinese vulnerability database;
Assessment algorithm module 206, carries out computational analysis according to preset algorithm to scanning result, and forms security evaluation report 207;
Scanning result storehouse 202, is used for memory scanning result data;
Chinese vulnerability database 210, is used for storing Chinese leak data;
Certificate of service storehouse 211, is used for storage server information and server end certificate;
In client 2: server end authentication module 205 is connected with certificate of service storehouse 211, server end authentication module 205 is by the checking of comparing of the server end certificate in the server end certificate of reception and certificate of service storehouse 211; Assessment algorithm module 206 is connected with scanning result storehouse 202, and assessment algorithm module 206 is transferred scanning result and according to preset algorithm, scanning result carried out to computational analysis from scanning result storehouse 202, thereby forms security evaluation report 207; Scan report processing module 208 is connected with Chinese vulnerability database 210, scanning result storehouse 202 respectively, from Chinese vulnerability database 210, extracts vulnerability information, transfers scanning result information from scanning result storehouse 202, and generates scan report 209.
The vulnerability scanning system of a kind of network-oriented security evaluation of the present invention, above-mentioned warning module 203, mainly to be whether intrusion detection module 18 finds invasion according to IDS process on server, if find to produce alarm, user just can be scanned or automatically start dispatching process module 17 by warning module 203 current network and scan; Its workflow, shown in Figure 3:
Step S1, the startup scan instruction that warning module 203 sends according to invasion inspection module 18 produces alarm, execution step S2;
Step S2, by scan task warehouse-in, execution step S3;
Step S3, arranges subtask priority the highest, execution step S4;
Step S4, has judged whether that scan procedure moves, and as judgement has scan procedure to move, performs step S5, otherwise execution step S7;
Step S5, judge scan procedure whether move complete, as complete in scan procedure operation, perform step S7, otherwise execution step S6;
Step S6, judges whether scan procedure is stopped by force, as scan procedure is stopped by force, performs step step S7, otherwise gets back to step S5;
Step S7, starts dispatching process module 17 and scans.
The vulnerability scanning system of a kind of network-oriented security evaluation of the present invention, is mainly to provide an interface, allows user be configured the information of certain scan session, then configuration information is formed to sweep parameter file, and sends to server end, as shown in Figure 4.
The vulnerability scanning system of a kind of network-oriented security evaluation of the present invention, is expanded the Chinese vulnerability database of setting up with Chinesizing module 204 by above-mentioned leak, each field in its database is as follows:
Plug-in unit ID (PID): describe the ID that detects the required plug-in unit of certain leak;
Plugin name (PNAME): the title leak title that this plug-in unit is found of describing this plug-in unit;
Leak is described (DESCRIPTION): describe leak relevant information, make user further understand this leak;
Solution (SOLUTION): the solution of describing leak;
Consult (SEEALSO): describe the chained address that leak patch is downloaded;
Risk class (RISKFACTOR): describe the corresponding risk class of leak, user knows that according to this which leak is large to the harm of system, needs download patches immediately;
Reference resources (REFERENCE): describe the relevant reference information of leak therewith;
Plug-in version (COPYRIGHT): describe the corresponding copyright information of this plug-in unit;
Leak family (FAMILY): describe the corresponding family of this leak information;
Leak kind (CATEGORY): describe the corresponding kind of this leak;
CVE numbers (CVE): the CVE numbering of describing leak;
Flag bit (FLAG): describe this plugin information and whether Chinesized.
Wherein, the leak kind of this Chinese vulnerability database has following five kinds: Attack, Denial, Info, Scanner and Others.Its leak family is as shown in table 1, and the system security assessment that these leak families can be below provides certain reference role:
Table 1 leak family classification table
1, AIX local security checks 22、Misc
2, back door 23、Netware
3, heavy attack 24, the network information service
4, CGI abuse 25, point-to-point file-sharing
5, CGI abuse: XSS 26, TCP device
6、CISCO 27, Red Hat local security checks
7、 DebianLocal inspection 28, remote document access
8, the Unix of acquiescence Account 29, remote procedure call
9, denial of service 30, service detection
10, Fedora local security checks 31, arrange
11, pointer abuse 32、 SlackwaraLocal security checks
12, fire compartment wall 33, Simple Mail Transfer protocol problem
13, FreeBSD local security checks 34, Simple Network Management Protocol
14、FTP 35, Solaris local security checks
15, Remote Acquisitioning shell 36、 SuSFLocal security checks
16, Remote Acquisitioning root authority 37、 UbuntuLocal security checks
17、General 38, useless service
18、 GentooLocal security checks 39, Web server
19, HP-UX local security checks 40、Windows
20, Mac operating system local security checks 41, Windows: Microsoft's bulletin
21, Mandr ake local security checks 42, Windows: user management
According to the structure in above System Security Vulnerability storehouse and leak family, an example of structure is as shown in table 2:
System vulnerability example of table 2
The vulnerability scanning system of a kind of network-oriented security evaluation of the present invention, above-mentioned assessment algorithm module 206, its security evaluation one word comprises the intension of two aspects: one refers to the assessment of the randomness that security incident is occurred; It two refers to the damnous assessment of security incident.Based on this, with P, represent the randomness that security incident occurs, with C, represent the loss or the impact that after security incident occurs, cause, the risk that represents to reflect system safety hierarchy level with S, wherein the codomain of P, C is interval [0,1], risk S is actually the likelihood estimation that consequence occurs to produce with it in security incident:
S=f (probability of occurrence of security incident is estimated, and the loss after security incident occurs is estimated)
=1-(security incident is probability of happening not) * (the nonevent loss of security incident is estimated)
=1-(1-P)*(1-C)
=P+C-P*C
The assessment collection of definition risk S is { high safety, Generally Recognized as safe, low safety }, and its analog value is { 0.3,0.7,1.0}; If S < 0.3 is high safety system; S > 0.7 is low safety system; Fall between is Generally Recognized as safe system.
The invention allows for a kind of safety evaluation method based on fuzzy mathematics, and this safety evaluation method is applied to vulnerability scanning system.The performing step of this algorithm is as follows:
(1) set up set of factors
Set of factors is that to affect each factor of passing judgment on object be the ordinary set that element forms.Conventionally with capital U, represent, that is: U={u 1, u 2..., u m, u irepresent each influencing factor.These factors, have ambiguity in various degree conventionally.
When the randomness that security incident is occurred is assessed, suppose and affect the fragility that the principal element of system safety is system, i.e. system vulnerability.So set of factors U 1={ system vulnerability }.Assessment to security incident consequence influence degree, weighs three aspects of significant degree of the significant degree of the degree of dependence of information assets, the existing precautionary measures, existing control measure from tissue conventionally, so set of factors U 2={ assets, safeguard procedures, control measure }.
(2) set up and evaluate collection
Evaluate collection and be the set that judge forms the various evaluation results of passing judgment on object and may making.Conventionally with capital V, represent, i.e. V={v 1, v 2..., v n, each element v irepresent various possible total evaluation results.Carry out the object of fuzzy evaluation, considering on the basis of all influencing factors exactly, from evaluating to concentrate, select a best evaluation result.
When the randomness that security incident is occurred is assessed, the evaluation collection V being delimited according to fuzzy evaluation rule by expert 1={ little, less, general, larger, large }={ 0.1,0.3,0.5,0.7,1.0}; And when security incident consequence influence degree is assessed, determined evaluation collection V 2=low, lower, in, higher, height }={ 0.1,0.3,0.5,0.7,1.0}.
(3) set up weight sets and carry out fuzzy comprehensive evoluation
In order to reflect the significance level of each factor, to each factor u i(i=1,2 ..., n) should give a corresponding flexible strategy a i(i=1,2 ..., n), the set A being formed by each flexible strategy={ a 1, a 2..., a n, be called factor weight sets, be called for short weight sets.And must meet &Sigma; i = 1 i = n a i = 1 , a i &GreaterEqual; 0 .
On affecting single factor (leak) of system safety, judge, its weight w 1=1.If this factor is to magnitude v idegree of membership be a i, a kind of definite degree of membership a is provided below imethod as follows:
It (is leak title about vulnerability information that the defined leak of vulnerability scanning system harm severity level instruction card (as described in Table 3) and leak harm possibility grade instruction card (as described in Table 4) and vulnerability scanning system are scanned to what obtain, leak hazard rating, leak family, leak is described, leak solution etc.) offer expert, every expert can, according to the information of leak and own residing environment, provide the harm possibility grade flexible strategy of each leak.The assessed value of leak risk factors is:
The security incident probability of happening being caused by system vulnerability is so: P = &Sigma; i = 1 5 ( a i * v i )
The method determines that degree of membership is more accurate, but more loaded down with trivial details, and when leak number increases, the workload of the method is relatively large.Therefore, can consider the family under leak in scan report to list, the harm possibility grade of the selected leak of the ratio family that expert occurs according to leak family calculates the assessed value R ' of leak risk factors.
Leak factor fuzzy appraisal set R={r1, r2, r3, r4, r5}, now a ican use r idetermine, formula is as follows:
r 1 = 1.0 , r 2,3,4,5 = 0 , R &prime; < 0.1 r 1 = 0.3 - R &prime; 0.3 - 0.1 , r 2 = 1 - r 1 , r 3,4,5 = 0,0.1 &le; R &prime; < 0.2 r 2 = R &prime; - 0.1 0.3 - 0.1 , r 1 = 1 - r 2 , r 3,4,5 = 0,0.2 &le; R &prime; < 0.3 r 2 = 0.5 - R &prime; 0.5 - 0.3 , r 3 = 1 - r 2 , r 1,4,5 = 0,0.3 &le; R &prime; < 0.4 r 3 = R &prime; - 0.3 0.5 - 0.3 , r 2 = 0 - r 3 , r 1,4,5 = 0,0.4 &le; R &prime; < 0.5 r 3 = 0.7 - R &prime; 0.7 - 0.5 , r 4 = 1 - r 3 , r 1,2,5 = 0,0.5 &le; R &prime; < 0.6 r 4 = R &prime; - 0.5 0.7 - 0.5 , r 3 = 1 - r 4 , r 1,2,5 = 0,0.6 &le; R &prime; < 0.7 r 4 = 1.0 - R &prime; 1.0 - 0.7 , r 5 = 1 - r 4 , r 1,2,3 = 0,0.7 &le; R &prime; < 0.85 r 5 = R &prime; - 0.7 1.0 - 0.7 , r 4 = 1 - r 5 , r 1,2,3 = 0,0.85 &le; R &prime; &le; 1.0
Table 3 leak harm severity level instruction card
Table 4 leak harm possibility grade instruction card
Give set of factors U 2in the corresponding weights of each factor be W={w 1, w 2, w 3, meet &Sigma; i = 1 3 w i = 1 . Expert is with reference to evaluating collection V 2to set of factors U 2in each factor evaluate, obtain single factor evaluation collection R i, R i={ r i1, r i2, r i3, r i4, r i5, the degree of membership of each factor being passed judgment on to collection is row composition simple element evaluation matrix R:
R = r 11 , r 12 , r 13 , r 14 , r 15 r 21 , r 22 , r 23 , r 24 , r 25 r 31 , r 32 , r 33 , r 34 , r 35
Single factor fuzzy evaluation, only reflects that a factor is on passing judgment on the impact of object, and this is obviously inadequate, only has comprehensive all influencing factors, just can draw the evaluation result of science.Weight sets and single factor fuzzy evaluation matrix is synthetic, can obtain fuzzy comprehensive evoluation collection B, B=W*R.Therefore the extent of damage that, security incident causes after occurring:
C=B*V 2 T
Provide an example of this assessment algorithm of application below:
Experimental situation: use developed vulnerability scanning system to certain lab lan IP address be 210.34.55.~-210.34.55.~10 multiple hosts carry out vulnerability scanning, 2205 plug-in units have been selected in this time scanning configuration.
Utilize native system to carry out primary system security evaluation to scanning result above, whole evaluation process is mainly divided into following step:
(1) vulnerability scanning system scans in resulting scan report, and high harm leak number is 9, and middle harm leak number is 35, and low harm leak number is 8.
(2) expert is on affecting the set of factors U of security incident consequence 2={ assets, safeguard procedures, control measure } are given weights, W={0.3, and 0.4,0.3}, simultaneously with reference to evaluating collection V 2to U 2in each factor evaluate, obtain Judgement Matrix R = 0,0.3,0.5,0.2,0 0,0.2,0.7,0.1,0 0,0.2,0.6,0.2,0 , Calculate C=0.486000.
(3) expert is according to the severity level of the descriptor of each leak and leak, pass judgment on the harm possibility grade of each leak, finally calculate security incident probability of happening P=0.335192, finally carrying out the risk S that fuzzy comprehensive evoluation obtains local area network (LAN) is 0.658289, therefore judges that this local area network (LAN) is Generally Recognized as safe system.
If endangering possibility grade according to leak family, expert selects, determine the words of the harm possibility grade of each leak, shown in selection result table 5 described as follows, finally calculate security incident probability of happening P=0.334808, finally carrying out the risk S that fuzzy comprehensive evoluation obtains local area network (LAN) is 0.658091, therefore judges that this local area network (LAN) is as Generally Recognized as safe system.
Table 5 leak harm possibility grade decision table
By the comparison of this two kinds of leak harm possibility grades system of selection, can find out that the two resulting evaluation result deviation is little, but second method has obviously greatly reduced expert's competition workload, so when the system vulnerability number of passing judgment on reaches certain quantity, can consider to adopt second method.Generally speaking, first method evaluation result is relatively accurate, but workload is large; Second method workload is less, but has certain error.
The processing method of the vulnerability scanning of a kind of network-oriented security evaluation of the present invention, comprises following process:
Client 2 is by being used certificate verification to be connected to the server end 1 of appointment, and server end 1 authenticates by client 2;
Client 2 starts 201 pairs of networks that will scan of scanning configuration module and is configured and configuration information is sent to server end 1;
Server end 1 starts 16 work of scanning engine service module, and the scanning engine service module 16 of server end 1 calls the plug-in unit in plugin library 11 according to configuration parameter and reads the corresponding scan history in scan history memory block 15 network of appointment is scanned;
The scanning engine service module 16 of server end 1 writes new scanning information in scan history memory block 15; The scanning engine service module 16 of server end 1 mates to see whether find leak scanning result with vulnerability database 12 simultaneously, finally scanning result is sent to client 2;
The storage of the scanning result of server end 1 is accepted in the scanning result storehouse 202 of client 2;
The assessment algorithm module 206 of client 2 is obtained scanning result information from scanning result storehouse 202, and according to preset algorithm, scanning result is carried out to computational analysis, and then forms security evaluation report 207;
The scan report processing module 208 of client 2, according to the scanning result information of obtaining in the vulnerability information in Chinese vulnerability database 210 and scanning result storehouse 202, generates scan report 209;
The intrusion detection module 18 of server end 1, after server operation, is just caught the situation of packet on monitored network constantly, mates with the rule of 13 li of rule bases, judges on network, whether there are abnormal conditions;
When network has abnormal conditions, just notify the warning module 203 in client 2, warning module 203 produces reports to the police, by user, current network is scanned to or automatically start the dispatching process module 17 of server end 1, by 16 pairs of whole networks of dispatching process module 17 driver sweep engine service modules, scan.
Above-described embodiment is only used for further illustrating vulnerability scanning system and the processing method thereof of a kind of network-oriented security evaluation of the present invention; but the present invention is not limited to embodiment; any simple modification, equivalent variations and modification that every foundation technical spirit of the present invention is done above embodiment, all fall into the protection range of technical solution of the present invention.

Claims (5)

1. a vulnerability scanning system for network-oriented security evaluation, comprises the server end and the client that adopt C/S framework, and this server end runs on Unix or Linux platform, and this client runs on windows platform; It is characterized in that:
This server end, comprising:
Scanning engine service module, is used for accepting the request of client, carries out scan task;
Plugin library, is used for the plug-in unit of memory check leak;
Vulnerability database, is used for storing leak data;
Scan history memory block, is used for memory scanning historical record data;
In server end: scanning engine service module respectively with plugin library, vulnerability database, scan history memory block is connected, scanning engine service module calls plug-in unit according to the request of client and from scan history memory block, reads corresponding scan history objective network is scanned from plugin library, and new scanning information is write in scan history memory block, scanning result is mated with vulnerability database and sees whether find leak, finally scanning result is sent to client simultaneously;
This client, comprising:
Scanning configuration module, provides an interface, allows user be configured the information of scan session, then configuration information is formed to sweep parameter file, and encryption sends to server end;
Scan report processing module, according to the vulnerability information in Chinese vulnerability database and scanning result Information generation scan report;
Assessment algorithm module, carries out computational analysis according to preset algorithm to scanning result, and forms security evaluation report;
Scanning result storehouse, is used for memory scanning result data;
Chinese vulnerability database, is used for storing Chinese leak data;
In client: assessment algorithm module is connected with scanning result storehouse, assessment algorithm module is transferred scanning result and according to preset algorithm, scanning result is carried out to computational analysis from scanning result storehouse, thereby forms security evaluation report; Scan report processing module is connected with Chinese vulnerability database, scanning result storehouse respectively, from Chinese vulnerability database, extracts vulnerability information, transfers scanning result information from scanning result storehouse, and generates scan report.
2. the vulnerability scanning system of network-oriented security evaluation according to claim 1, is characterized in that:
Described server end, also comprises:
Dispatching process module, is used for accepting the request of client, to scanning engine service module, sends driver sweep instruction;
Intrusion detection module, is used for monitoring network condition, judges whether network has extremely, starts scanning when abnormal having;
Rule base, is used for storage rule data;
In server end: dispatching process module is connected with scanning engine service module, dispatching process module driver sweep engine service module is carried out scan task; Intrusion detection module is connected with rule base, and intrusion detection module is monitored network condition and the rule in snoop results and rule base is compared to judge whether network occurs extremely;
Described client, also comprises:
Warning module, the startup scan instruction sending according to the intrusion detection module of server end produces alarm, by user, current network is scanned or the dispatching process module that automatically starts server end scans;
When the intrusion detection module of server end notes abnormalities, the intrusion detection module of server end sends startup scan instruction to the warning module of client, the warning module of client produces warning message, and the dispatching process module that automatically starts as required server end scans.
3. the vulnerability scanning system of network-oriented security evaluation according to claim 1 and 2, is characterized in that:
Described server end, also comprises:
Client validation module, the request that is used for accepting client is verified client certificate, and is sent server end certificate to client;
User certificate stack room, are used for storing subscriber information and client certificate;
In server end: client validation module is connected with user certificate stack room, client validation module is by the checking of comparing of the client certificate in the checking request of the client of acceptance and user certificate stack room;
Described client, also comprises:
Server end authentication module, is used for sending client certificate to server end, and reception server end certificate;
Certificate of service storehouse, is used for storage server information and server end certificate;
In client: server end authentication module is connected with certificate of service storehouse, server end authentication module is by the checking of comparing of the server end certificate in the server end certificate of reception and certificate of service storehouse.
4. the vulnerability scanning system of network-oriented security evaluation according to claim 1, is characterized in that: described client, also comprises:
Leak expands and Chinesizing module, is used for setting up Chinese vulnerability database;
In client: leak expansion is connected with Chinese vulnerability database with Chinesizing module.
5. a processing method for the vulnerability scanning of network-oriented security evaluation, is characterized in that: comprise following process:
Client is by being used certificate verification to be connected to the server end of appointment, and server end passes through client certificate;
Client terminal start-up scanning configuration module is configured and configuration information is sent to server end the objective network that will scan;
Server end starts the work of scanning engine service module, and the scanning engine service module of server end calls the plug-in unit in plugin library according to configuration parameter and reads the corresponding scan history in scan history memory block the network of appointment is scanned;
The scanning engine service module of server end writes new scanning information in scan history memory block; The scanning engine service module of server end mates to see whether find leak, finally scanning result is sent to client scanning result with vulnerability database simultaneously;
The scanning result library storage of client comes from the scanning result of server end;
The assessment algorithm module of client is obtained scanning result information from scanning result storehouse, and according to preset algorithm, scanning result is carried out to computational analysis, and then forms security evaluation report;
The scan report processing module of client, according to the scanning result information of obtaining in the vulnerability information in Chinese vulnerability database and scanning result storehouse, generates scan report;
The intrusion detection module of server end, after server operation, is just caught the situation of packet on monitored network constantly, mates with the rule in rule base, judges on network, whether there are abnormal conditions;
When network has abnormal conditions, just notify the warning module in client, warning module produces reports to the police, by user, current network is scanned to or automatically start the dispatching process module of server end, by dispatching process module driver sweep engine service module, whole network is scanned.
CN200910112916.5A 2009-12-01 2009-12-01 Vulnerability scanning system oriented to safety assessment and processing method thereof Active CN102082659B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910112916.5A CN102082659B (en) 2009-12-01 2009-12-01 Vulnerability scanning system oriented to safety assessment and processing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910112916.5A CN102082659B (en) 2009-12-01 2009-12-01 Vulnerability scanning system oriented to safety assessment and processing method thereof

Publications (2)

Publication Number Publication Date
CN102082659A CN102082659A (en) 2011-06-01
CN102082659B true CN102082659B (en) 2014-07-23

Family

ID=44088419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910112916.5A Active CN102082659B (en) 2009-12-01 2009-12-01 Vulnerability scanning system oriented to safety assessment and processing method thereof

Country Status (1)

Country Link
CN (1) CN102082659B (en)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413011B (en) * 2011-11-18 2015-09-30 北京奇虎科技有限公司 A kind of method and system of LAN safety assessment
CN103634280B (en) * 2012-08-23 2018-11-09 百度在线网络技术(北京)有限公司 A kind of web portal security scan method and device
US20140115564A1 (en) 2012-10-19 2014-04-24 International Business Machines Corporation Differential static program analysis
CN102945351B (en) * 2012-11-05 2015-10-28 中国科学院软件研究所 Based on the mobile intelligent terminal security breaches restorative procedure of Quick Response Code under cloud environment
CN104113443B (en) 2013-04-19 2018-10-02 南京中兴新软件有限责任公司 A kind of network device detection methods, device and cloud detection system
CN104144148A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Vulnerability scanning method and server and risk assessment system
CN104462983B (en) * 2013-09-22 2019-04-26 深圳市腾讯计算机系统有限公司 A kind of PHP source code processing method and system
CN104683127B (en) * 2013-11-27 2018-04-27 北京神州泰岳软件股份有限公司 A kind of equipment weak passwurd concentrates the method and system verified
CN103780614B (en) * 2014-01-21 2016-12-07 金华比奇网络技术有限公司 A kind of SQL injection loophole method for digging based on simulated strike extension
CN104506522B (en) 2014-12-19 2017-12-26 北京神州绿盟信息安全科技股份有限公司 vulnerability scanning method and device
CN105939311A (en) * 2015-08-11 2016-09-14 杭州迪普科技有限公司 Method and device for determining network attack behavior
CN105335290A (en) * 2015-11-12 2016-02-17 浪潮电子信息产业股份有限公司 Software security testing method
CN105516131B (en) * 2015-12-04 2019-03-26 珠海豹趣科技有限公司 A kind of method, apparatus and electronic equipment scanning loophole
CN106856473B (en) * 2015-12-09 2021-04-20 阿里巴巴集团控股有限公司 Vulnerability detection method and device
CN105763562B (en) * 2016-04-15 2019-04-09 全球能源互联网研究院 Power Information Network method for establishing model and system towards electric power CPS risk assessment
CN106096422A (en) * 2016-06-27 2016-11-09 上海柯力士信息安全技术有限公司 A kind of peace dog scanning device integrated approach for network vulnerability
CN106254337A (en) * 2016-07-29 2016-12-21 北京北信源软件股份有限公司 A kind of network scanning method and network scanning system
CN106230857A (en) * 2016-08-30 2016-12-14 上海新华控制技术(集团)有限公司 A kind of active leakage location towards industrial control system and detection method
CN106685954B (en) * 2016-12-27 2019-11-15 北京神州绿盟信息安全科技股份有限公司 A kind of plug-in unit scans, determines the method and device of rule-based scheduling sequence in plug-in unit
CN107426191A (en) * 2017-06-29 2017-12-01 上海凯岸信息科技有限公司 A kind of leak early warning and emergency response automatic warning system
CN107181768A (en) * 2017-07-26 2017-09-19 成都科来软件有限公司 A kind of leak detection method of server system
US10678954B2 (en) * 2017-09-21 2020-06-09 GM Global Technology Operations LLC Cybersecurity vulnerability prioritization and remediation
CN108063755B (en) * 2017-11-08 2020-12-15 携程旅游信息技术(上海)有限公司 Vulnerability scanning method, system, storage medium and electronic equipment
CN111385249B (en) * 2018-12-28 2023-07-18 中国电力科学研究院有限公司 Vulnerability detection method
CN111385253B (en) * 2018-12-28 2023-05-23 中国电力科学研究院有限公司 Vulnerability detection system for network security of power distribution automation system
CN109861994A (en) * 2019-01-17 2019-06-07 安徽云探索网络科技有限公司 The vulnerability scanning method and its scanning means that cloud is invaded
CN110225018A (en) * 2019-05-31 2019-09-10 江苏百达智慧网络科技有限公司 A method of based on more equipment evaluation web application fragility
CN110474868B (en) * 2019-06-27 2022-12-16 山东安畅物联网科技有限公司 Internet of things environment safety detection method and system based on block chain excitation mechanism
CN110768858A (en) * 2019-08-14 2020-02-07 奇安信科技集团股份有限公司 Signaling control method and device for penetration test, storage medium and electronic device
CN110597724B (en) * 2019-09-18 2023-07-18 彩讯科技股份有限公司 Calling method and device of application security test component, server and storage medium
CN111193727A (en) * 2019-12-23 2020-05-22 成都烽创科技有限公司 Operation monitoring system and operation monitoring method
CN111147518B (en) * 2019-12-30 2021-08-13 论客科技(广州)有限公司 Attack and defense countermeasure based e-mail system security evaluation method and device
WO2021189252A1 (en) * 2020-03-24 2021-09-30 深圳市欢太科技有限公司 Image security scanning system, method and apparatus, device, and storage medium
CN111600897B (en) * 2020-05-21 2022-10-28 杭州安恒信息技术股份有限公司 Network security event grade evaluation method, equipment and related equipment
CN114760145A (en) * 2022-04-28 2022-07-15 金祺创(北京)技术有限公司 Cloud architecture-based method and device for rapid scanning analysis and cross validation of host vulnerability

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242279A (en) * 2008-03-07 2008-08-13 北京邮电大学 Automatic penetration testing system and method for WEB system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242279A (en) * 2008-03-07 2008-08-13 北京邮电大学 Automatic penetration testing system and method for WEB system

Also Published As

Publication number Publication date
CN102082659A (en) 2011-06-01

Similar Documents

Publication Publication Date Title
CN102082659B (en) Vulnerability scanning system oriented to safety assessment and processing method thereof
US8219496B2 (en) Method of and apparatus for ascertaining the status of a data processing environment
CN113660224B (en) Situation awareness defense method, device and system based on network vulnerability scanning
KR100745044B1 (en) Apparatus and method for protecting access of phishing site
CN112560046B (en) Assessment method and device for business data security index
CN112184091A (en) Industrial control system security threat assessment method, device and system
CN112738121B (en) Password security situation awareness method, device, equipment and readable storage medium
CN110740140A (en) network information security supervision system based on cloud platform
CN115021942B (en) Tamper-resistant network data secure transmission method
CN111339141A (en) Data transmission method, block link node equipment and medium
CN113468075A (en) Security testing method and system for server-side software
CN114915477A (en) Information security protection system of computer network
CN111327602B (en) Equipment access processing method, equipment and storage medium
CN108900328A (en) A kind of electricity grid network data safety test macro and method
CN117292054A (en) Three-dimensional digital-based intelligent operation and maintenance method and system for power grid
CN113922975A (en) Security control method, server, terminal, system and storage medium
CN105142150A (en) Wireless device loophole scanning method and system based on BS mode
CN106130996B (en) A kind of website attack protection verifying system and method
CN206181087U (en) Active leak detecting system towards industrial control system
CN101453388B (en) Inspection method for Internet service operation field terminal safety
EP4362413A1 (en) Diagnostic device and diagnosis method
CN111555857A (en) Edge network and network transmission method
CN113301019B (en) Verification code vulnerability detection method and device, electronic device and storage medium
CN112910730B (en) Communication network real-time early warning monitoring system and monitoring method thereof
CN117614694B (en) Identity authentication-based bidding method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20110601

Assignee: XIAMEN SECURITY INTELLIGENCE INFORMATION TECHNOLOGY CO.,LTD.

Assignor: XIAMEN MEIYA PICO INFORMATION Co.,Ltd.

Contract record no.: X2023350000021

Denomination of invention: A vulnerability scanning system for network security evaluation and its processing method

Granted publication date: 20140723

License type: Common License

Record date: 20230223

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20110601

Assignee: Xiaoma Baoli (Xiamen) Network Technology Co.,Ltd.

Assignor: XIAMEN MEIYA PICO INFORMATION Co.,Ltd.

Contract record no.: X2023350000079

Denomination of invention: A Vulnerability Scanning System for Network Security Assessment and Its Processing Method

Granted publication date: 20140723

License type: Common License

Record date: 20230313