CN103414718A - Distributed type Web vulnerability scanning method - Google Patents

Distributed type Web vulnerability scanning method Download PDF

Info

Publication number
CN103414718A
CN103414718A CN2013103605764A CN201310360576A CN103414718A CN 103414718 A CN103414718 A CN 103414718A CN 2013103605764 A CN2013103605764 A CN 2013103605764A CN 201310360576 A CN201310360576 A CN 201310360576A CN 103414718 A CN103414718 A CN 103414718A
Authority
CN
China
Prior art keywords
vulnerability scanning
url
node
main controlled
controlled node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103605764A
Other languages
Chinese (zh)
Inventor
柯宗贵
柯宗庆
杨育斌
黄利果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bluedon Information Security Technologies Co Ltd
Original Assignee
Bluedon Information Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bluedon Information Security Technologies Co Ltd filed Critical Bluedon Information Security Technologies Co Ltd
Priority to CN2013103605764A priority Critical patent/CN103414718A/en
Publication of CN103414718A publication Critical patent/CN103414718A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a distributed type Web vulnerability scanning method. The method specifically comprises the steps that urls initially requested by users are sent to a main control node to be dispatched and managed in a unified mode, a vulnerability scanning program uses a crawler system to process the submitted urls, and the probability of repeated url vulnerability scanning is removed through a bloom filter. In terms of the returned result, the remove network is attacked by using a series of attack vectors. In terms of contents returned by the attack, the contents are analyzed and processed according to a corresponding rule, the urls are filtered out of the returned contents to serve as the new urls to be further processed, and all results obtained from the vulnerability scanning process are sent to a statistics center to be processed. By means of the distributed type Web vulnerability scanning method, the speed of the vulnerability scanning process is increased, loads can be scattered to other sub-nodes in a balanced mode when the single point of failure happens in the vulnerability scanning process, and the ability of the system to resist the failure is improved.

Description

A kind of method of distributed Web vulnerability scanning
Technical field
The present invention relates to the network security technology field, relate in particular to a kind of method of distributed Web vulnerability scanning.
Background technology
Along with various Web application, such as Web bank, ecommerce, personal space, cloud storage etc. constantly enters people's life, if there is hidden danger in these Web application, personal information or even Web station system all can face security risk so.According to statistics, current 75% attack is all undertaken by Web.
Guaranteeing that Web service can move with security and stability, is a vital task of IT department in numerous companies and office.Generally, owing to lacking effective Web security evaluation instrument and checking mechanism, safety problem is difficult to be found at ordinary times, and often when major accident occurs such problem just can be found.
Tradition Web vulnerability scanning software, generally be based on one-of-a-kind system, and the scanner correlation module is installed concentratedly on same computer.Therefore each computer security diagnostic result is mutually isolated, and the assessment of network overall risk and preventive effect are poor, and sweep speed is slow, and single node exists inefficacy can make the danger of whole system collapse.In the Web scanning system, in certain hour, the ability that unit is processed is limited, how to improve the associated treatment of vulnerability scanning multinode, and solves the load balancing that the multinode machine of delaying causes, and is a problem demanding prompt solution.
Summary of the invention
The objective of the invention is in order to overcome the defect of prior art, a kind of method of distributed Web vulnerability scanning is provided, the idiographic flow of the method is: the url of user's initial request, unification is given main controlled node and is carried out dispatching management, the vulnerability scanning process is processed the url of submission with crawler system, and with Bloom filter, get rid of the repeatability of vulnerability scanning url, for the result of returning, with vector of attack, long-range website is attacked, the content of returning for attack, according to respective rule, carry out analyzing and processing, and the url that returned content is filtered out, as new request url, be further processed, the result that all vulnerability scanning processes have been scanned, giving the statistics center processes.
The vulnerability scanning process adopts a main controlled node to be responsible for the overall scheduling of url, to reach the load balancing of distributed treatment, child node is obtained initial url from main controlled node, giving crawler system processes, and by the new url extracted in webpage, after Bloom filter filtered, the capacity of being placed on was in the buffer queue of N, if extract the domain name made new advances, new domain name be passed to main controlled node in real time.
In order to safeguard long the connection, child node regularly sends heartbeat packet to main controlled node, judges whether main controlled node is online.
Server to the server that goes offline or increase is used consistent hashing to carry out the processing of load balancing.
Child node can regularly send to the master control node by cpu information, and main controlled node carries out load balancing according to the scheduling situation of child node to whole system, new domain name is distributed to the child node that the cpu occupation rate is low and process.
The beneficial effect that technical solution of the present invention is brought:
By the present invention, not only improved the speed that vulnerability scanning is processed, and when vulnerability scanning process generation Single Point of Faliure, load meeting equilibrium is distributed to other all child nodes, has improved the ability of system counter fault.
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is method flow diagram of the present invention;
Fig. 2 is the mutual and message processing flow figure of main controlled node and child node in the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment obtained, belong to the scope of protection of the invention.
The invention provides a kind of method of distributed Web vulnerability scanning, by the method, solve main controlled node and how to dispatch, and the problem of load balancing of child node program crashing.
As shown in Figure 1, the url of user's initial request, unify to give main controlled node and carry out dispatching management particular flow sheet of the present invention, and the vulnerability scanning process is processed the url of submission with crawler system, and with Bloom filter, gets rid of the repeatability of vulnerability scanning url.For the result of returning, with a series of vector of attacks, long-range website is attacked, the content of returning for attack, according to respective rule, carry out analyzing and processing, and the url that returned content is filtered out, as new request url, be further processed, by the result that all vulnerability scanning processes have scanned, give the statistics center and process.
The vulnerability scanning process adopts a main controlled node to be responsible for the overall scheduling of url, to reach the load balancing of distributed treatment.Child node is obtained some initial url from main controlled node, and give crawler system and process, and by the new url extracted in webpage, after Bloom filter filters, the capacity of being placed on is in the buffer queue of N, if extract the domain name made new advances, new domain name be passed to main controlled node in real time.
During concrete enforcement, the mutual and message processing flow of main controlled node and child node is as shown in Figure 2:
Client sends request, and main controlled node, according to strategy, is distributed to different child nodes by url and processed, and uses consistent hashing for the server of the server gone offline or increase, to carry out the processing of load balancing, the large-scale data migration of avoiding the machine of delaying to produce.In order to safeguard long the connection, child node regularly sends heartbeat packet to main controlled node, judges whether main controlled node is online.The consistent hashing dispatching method makes increase and deletes server very convenient, if n child node arranged, when the machine of delaying occurring or increasing node, only has the object of 1/ (n-1) or 1/ (n+1) to need migration; The consistent hashing algorithm has also increased the method for Virtual Service node, and the buffer memory redistribution while reducing to greatest extent the service node increase and decrease, to reach load balancing.
Child node can regularly send to the master control node by cpu information, and main controlled node can carry out load balancing to whole system according to the scheduling situation of child node, new domain name is distributed to the child node that the cpu occupation rate is low and process.
Child node is initiated web-page requests, and the analyzing responding bag, by the different domain name newly produced, gives main controlled node and dispatches.
After finishing dealing with in a website, each child node is issued main controlled node by the site information result, by main controlled node, result is carried out to last analysis and statistics, and the result that finally will have been analyzed by main controlled node sends to the log collection center.
By Distributed Hole scan procedure of the present invention, improved the speed that vulnerability scanning is processed, and when vulnerability scanning process generation Single Point of Faliure, load meeting equilibrium is distributed to other all child nodes, has improved the ability of system counter fault.
The method of above a kind of distributed Web vulnerability scanning that the embodiment of the present invention is provided is described in detail, applied specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment is just be used to helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (5)

1. the method for a distributed Web vulnerability scanning, it is characterized in that, the idiographic flow of the method is: the url of user's initial request, unification is given main controlled node and is carried out dispatching management, the vulnerability scanning process is processed the url of submission with crawler system, and with Bloom filter, get rid of the repeatability of vulnerability scanning url, for the result of returning, with vector of attack, long-range website is attacked, the content of returning for attack, according to respective rule, carry out analyzing and processing, and the url that returned content is filtered out, as new request url, be further processed, the result that all vulnerability scanning processes have been scanned, giving the statistics center processes.
2. method according to claim 1, it is characterized in that, the vulnerability scanning process adopts a main controlled node to be responsible for the overall scheduling of url, and to reach the load balancing of distributed treatment, child node is obtained initial url from main controlled node, giving crawler system processes, and by the new url extracted in webpage, after Bloom filter filtered, the capacity of being placed on was in the buffer queue of N, if extract the domain name made new advances, new domain name be passed to main controlled node in real time.
3. method according to claim 1 and 2, is characterized in that, in order to safeguard long the connection, child node regularly sends heartbeat packet to main controlled node, judges whether main controlled node is online.
4. method according to claim 1 and 2, is characterized in that, uses consistent hashing to carry out the processing of load balancing to the server of the server that goes offline or increase.
5. method according to claim 1 and 2, it is characterized in that, child node can regularly send to the master control node by cpu information, and main controlled node carries out load balancing according to the scheduling situation of child node to whole system, new domain name is distributed to the child node that the cpu occupation rate is low and process.
CN2013103605764A 2013-08-16 2013-08-16 Distributed type Web vulnerability scanning method Pending CN103414718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103605764A CN103414718A (en) 2013-08-16 2013-08-16 Distributed type Web vulnerability scanning method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103605764A CN103414718A (en) 2013-08-16 2013-08-16 Distributed type Web vulnerability scanning method

Publications (1)

Publication Number Publication Date
CN103414718A true CN103414718A (en) 2013-11-27

Family

ID=49607704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103605764A Pending CN103414718A (en) 2013-08-16 2013-08-16 Distributed type Web vulnerability scanning method

Country Status (1)

Country Link
CN (1) CN103414718A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699845A (en) * 2013-12-25 2014-04-02 北京神州绿盟信息安全科技股份有限公司 Method and device for displaying scanning progress
CN104980309A (en) * 2014-04-11 2015-10-14 北京奇虎科技有限公司 Website security detecting method and device
CN105978894A (en) * 2016-06-27 2016-09-28 上海柯力士信息安全技术有限公司 Network security monitoring management system based on security vulnerability scanning cloud platform
CN106096008A (en) * 2016-06-23 2016-11-09 北京工业大学 A kind of web crawlers method for finance warehouse receipt wind control
CN106161450A (en) * 2016-07-20 2016-11-23 上海携程商务有限公司 Distributed HTTPS monitors method
CN106161455A (en) * 2016-07-25 2016-11-23 恒安嘉新(北京)科技有限公司 A kind of multimode and engine distributed cloud management system and detection method
CN106790085A (en) * 2016-12-22 2017-05-31 国网新疆电力公司信息通信公司 Vulnerability scanning method, apparatus and system
CN107026871A (en) * 2017-05-15 2017-08-08 安徽大学 Web vulnerability scanning method based on cloud computing
CN107959662A (en) * 2016-10-18 2018-04-24 中国电信股份有限公司 The method and system of web portal security detection
CN108121706A (en) * 2016-11-28 2018-06-05 央视国际网络无锡有限公司 A kind of optimization method of distributed reptile
CN110941788A (en) * 2019-12-17 2020-03-31 山西云时代技术有限公司 Cloud environment distributed Web page extraction and analysis system and method for edge computing
CN112968917A (en) * 2021-05-19 2021-06-15 华东交通大学 Penetration test method and system for network equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104601A (en) * 2011-01-14 2011-06-22 无锡市同威科技有限公司 Web vulnerability scanning method and device based on infiltration technology
CN103095778A (en) * 2011-11-07 2013-05-08 北京知道创宇信息技术有限公司 Web application firewall and web application safety protection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104601A (en) * 2011-01-14 2011-06-22 无锡市同威科技有限公司 Web vulnerability scanning method and device based on infiltration technology
CN103095778A (en) * 2011-11-07 2013-05-08 北京知道创宇信息技术有限公司 Web application firewall and web application safety protection method

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699845A (en) * 2013-12-25 2014-04-02 北京神州绿盟信息安全科技股份有限公司 Method and device for displaying scanning progress
CN103699845B (en) * 2013-12-25 2017-05-17 北京神州绿盟信息安全科技股份有限公司 Method and device for displaying scanning progress
US9954886B2 (en) 2014-04-11 2018-04-24 Beijing Qihoo Technology Company Limited Method and apparatus for detecting website security
CN104980309A (en) * 2014-04-11 2015-10-14 北京奇虎科技有限公司 Website security detecting method and device
WO2015154539A1 (en) * 2014-04-11 2015-10-15 北京奇虎科技有限公司 Website security detection method and apparatus
CN106096008A (en) * 2016-06-23 2016-11-09 北京工业大学 A kind of web crawlers method for finance warehouse receipt wind control
CN106096008B (en) * 2016-06-23 2021-01-05 北京工业大学 Web crawler method for financial warehouse receipt wind control
CN105978894A (en) * 2016-06-27 2016-09-28 上海柯力士信息安全技术有限公司 Network security monitoring management system based on security vulnerability scanning cloud platform
CN106161450A (en) * 2016-07-20 2016-11-23 上海携程商务有限公司 Distributed HTTPS monitors method
CN106161450B (en) * 2016-07-20 2019-12-20 上海携程商务有限公司 Distributed HTTPS monitoring method
CN106161455A (en) * 2016-07-25 2016-11-23 恒安嘉新(北京)科技有限公司 A kind of multimode and engine distributed cloud management system and detection method
CN106161455B (en) * 2016-07-25 2019-06-04 恒安嘉新(北京)科技股份公司 A kind of multimode and engine distribution cloud management system and detection method
CN107959662A (en) * 2016-10-18 2018-04-24 中国电信股份有限公司 The method and system of web portal security detection
CN107959662B (en) * 2016-10-18 2020-12-01 中国电信股份有限公司 Website security detection method and system
CN108121706A (en) * 2016-11-28 2018-06-05 央视国际网络无锡有限公司 A kind of optimization method of distributed reptile
CN106790085B (en) * 2016-12-22 2020-10-23 国网新疆电力公司信息通信公司 Vulnerability scanning method, device and system
CN106790085A (en) * 2016-12-22 2017-05-31 国网新疆电力公司信息通信公司 Vulnerability scanning method, apparatus and system
CN107026871B (en) * 2017-05-15 2020-08-25 安徽大学 Web vulnerability scanning method based on cloud computing
CN107026871A (en) * 2017-05-15 2017-08-08 安徽大学 Web vulnerability scanning method based on cloud computing
CN110941788A (en) * 2019-12-17 2020-03-31 山西云时代技术有限公司 Cloud environment distributed Web page extraction and analysis system and method for edge computing
CN112968917A (en) * 2021-05-19 2021-06-15 华东交通大学 Penetration test method and system for network equipment
CN112968917B (en) * 2021-05-19 2021-08-06 华东交通大学 Penetration test method and system for network equipment

Similar Documents

Publication Publication Date Title
CN103414718A (en) Distributed type Web vulnerability scanning method
JP2013537344A5 (en)
CN113489691B (en) Network access method, network access device, computer readable medium and electronic equipment
CN110493043B (en) Distributed situation awareness calling method and device
WO2017080161A1 (en) Alarm information processing method and device in cloud computing
CN106686039B (en) Resource scheduling method and device in cloud computing system
CN107168844B (en) Performance monitoring method and device
CN107645483A (en) Risk Identification Method, risk identification device, cloud risk identification apparatus and system
CN113676563B (en) Scheduling method, device, equipment and storage medium of content distribution network service
Somani et al. DDoS victim service containment to minimize the internal collateral damages in cloud computing
CN102833228A (en) Virus detection system and method for immune network under cloud computing environment
Solaimani et al. Online anomaly detection for multi‐source VMware using a distributed streaming framework
Mallikarjuna et al. OLB: a nature inspired approach for load balancing in cloud computing
Zhang et al. Behavior reconstruction models for large-scale network service systems
CN110493218B (en) Situation awareness virtualization method and device
CN110471975B (en) Internet of things situation awareness calling method and device
CN107046546A (en) A kind of network safety control method and device
Imran et al. Cloud-niagara: A high availability and low overhead fault tolerance middleware for the cloud
Song et al. A Hybrid Data Security System of Internet of Things
Lee et al. Development of an optimal load balancing algorithm based on ANFIS modeling for the clustering web-server
Varghese et al. Enhancing NameNode fault tolerance in Hadoop over cloud environment
Deshmukh et al. Intrusion detection system for cloud computing
Pechenkin et al. Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster
Qiu et al. A security controller-based software defined security architecture
Sauber et al. A novel hadoop security model for addressing malicious collusive workers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131127