CN105471919A - Network security vulnerability scanning and managing system - Google Patents

Network security vulnerability scanning and managing system Download PDF

Info

Publication number
CN105471919A
CN105471919A CN201610026034.7A CN201610026034A CN105471919A CN 105471919 A CN105471919 A CN 105471919A CN 201610026034 A CN201610026034 A CN 201610026034A CN 105471919 A CN105471919 A CN 105471919A
Authority
CN
China
Prior art keywords
module
scanning
security
vulnerability
qualitative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610026034.7A
Other languages
Chinese (zh)
Inventor
杨林
粟本雄
汤影
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Zhiyangyifang Software Co Ltd
Original Assignee
Chengdu Zhiyangyifang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Zhiyangyifang Software Co Ltd filed Critical Chengdu Zhiyangyifang Software Co Ltd
Priority to CN201610026034.7A priority Critical patent/CN105471919A/en
Publication of CN105471919A publication Critical patent/CN105471919A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a network security vulnerability scanning and managing system, comprising a detection module, a scanning module, a qualitative module, a restoration module, an examination module and a vulnerability database. The detection module discovers network resources; the scanning module identifies resource attributes and scans security vulnerabilities; the qualitative module perform qualitative analysis on a security risk according to the security vulnerability scanned by the qualitative module; the restoration module provides a restoration suggestion and a preventive measure according to the risk of the vulnerability; the examination module effectively examines the restoration suggestion and the preventive measure after restoration; and the vulnerability database stores system and data vulnerabilities in a current network system. The system can support a plurality of operating systems and network devices to be used as detecting and scanning objects, perform accurate qualitative analysis on the security risk of a scanning object, and provide a restoration strategy to restore equipment security risks.

Description

Network security vulnerabilities scanning and management system
Technical field
The present invention relates to the scanning of a kind of network security vulnerabilities and management system.
Background technology
Along with developing rapidly of computer technology, the business processed on computers is also by based on the mathematical operation of unit, file process, and interior business process, office automation etc. based on the simple internal network connected develop into based on the enterprise-class computers treatment system of the in-house network (Intranet) of complexity, extranet (Extranet), Global Internet (Internet) and worldwide information sharing and Business Processing.
While system processing power improves, the concatenation ability of system is also in continuous improve.But while concatenation ability information, negotiability improve, the safety problem of connection Network Based also becomes increasingly conspicuous, and overall network security is mainly manifested in the following aspects: the safety etc. of the physical security of network, network topology structure safety, network system security, application system security and network management.
Network security work is the game of defense and attack, is ensure information security, the cornerstone that everything goes well with your work carries out.In time, examine the weakness of oneself information work accurately closely, examine leak and the problem of oneself information platform closely, in the safe war of this field information, first chance could be in, establish oneself in an unassailable position.Only accomplish the safety of self, could be based on own job, the operation that guarantee company's business is sane, this is the first step of carrying out the work the information age.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, a kind of network security vulnerabilities is provided to scan and management system, this system can support that several operation systems, the network equipment are as detection and sweep object, can carry out the security risk of sweep object accurately qualitative, correcting strategy can be provided device security risk is repaired.
The object of the invention is to be achieved through the following technical solutions: network security vulnerabilities scanning and management system, it comprises detection module, scan module, Qualitative module, repair module, auditing module and vulnerability scan, described detection module finds networked asset, described scan module identification Asset Attributes, scanning security breaches, described Qualitative module is according to the qualitative security risk of security breaches of scanning, described reparation module provides according to the risk of leak and repairs suggestion and precautionary measures, described auditing module is effectively audited reparation suggestion and precautionary measures after reparation completes, system in described vulnerability scan storage covering current network and data leak.
This system also comprises wireless security module, and wireless security module finds wireless device, terminal and model distribution situation in institute overlay area in real time, assists to identify rogue wireless equipment, terminal.
Described scan module adopts gradual scanning analysis mode, and the identification of employing operation system fingerprint, intelligent miniport service identification accurately present the information of sweep object.
Leak quantity in described vulnerability scan is more than 12000 kinds.
Described vulnerability scan keeps fortnightly regular vulnerability database to upgrade, and upgrades immediately when finding great leak.
Described system provides 15 kinds of scanning strategies.
The invention has the beneficial effects as follows: the invention provides the scanning of a kind of network security vulnerabilities and management system, this system can support that several operation systems, the network equipment are as detection and sweep object, can carry out the security risk of sweep object accurately qualitative, correcting strategy can be provided device security risk is repaired; The accurate judgement of vulnerability information, except using conventional method scanning, can also adopt the scan method of number of different types to carry out association verification for same leak, accurately judge effect to reach; Strong scan efficiency ensures that integrated use multiple technologies complete discovery and scanning process fast, scans overall efficiency and occupy first place in multinomial like product comparation and assessment.
Accompanying drawing explanation
Fig. 1 is system architecture diagram.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail, but protection scope of the present invention is not limited to the following stated.
As shown in Figure 1, network security vulnerabilities scanning and management system, it comprises detection module, scan module, Qualitative module, repair module, auditing module and vulnerability scan, described detection module finds networked asset, described scan module identification Asset Attributes, scanning security breaches, described Qualitative module is according to the qualitative security risk of security breaches of scanning, described reparation module provides according to the risk of leak and repairs suggestion and precautionary measures, described auditing module is effectively audited reparation suggestion and precautionary measures after reparation completes, system in described vulnerability scan storage covering current network and data leak.
This system also comprises wireless security module, wireless security module finds wireless device, terminal and model distribution situation in institute overlay area in real time, assist to identify rogue wireless equipment, terminal, concerning security matters unit is helped to find wireless signal, and can find the wireless security hidden danger existing for the dangerous configuration of wireless device further, provide wired, wireless network vulnerability analysis total solution.
Described scan module adopts gradual scanning analysis mode, and the identification of employing operation system fingerprint, intelligent miniport service identification accurately present the information of sweep object.
Leak quantity in described vulnerability scan is more than 12000 kinds.
Described vulnerability scan keeps fortnightly regular vulnerability database to upgrade, and upgrades immediately when finding great leak.
Described system provides 15 kinds of scanning strategies.
Network security vulnerabilities of the present invention scanning with management system with the most authoritative, the most comprehensive domestic Chinese leak knowledge base (CNCVE) for support, contain abundant research experience and deep knowledge accumulation, can be worth for client carries products application that is lasting, high-quality.Detection module detects the networked asset found in protection range in real time; scan module carries out Attribute Recognition to the networked asset found; and scan the security breaches whether existed in vulnerability scan; Qualitative module is according to the harm of security breaches its security risk qualitative; repair module and provide reparation suggestion and precautionary measures, auditing module carries out validity examination to reparation suggestion and precautionary measures after repair.

Claims (6)

1. network security vulnerabilities scanning and management system, it is characterized in that: it comprises detection module, scan module, Qualitative module, repair module, auditing module and vulnerability scan, described detection module finds networked asset, described scan module identification Asset Attributes, scanning security breaches, described Qualitative module is according to the qualitative security risk of security breaches of scanning, described reparation module provides according to the risk of leak and repairs suggestion and precautionary measures, described auditing module is effectively audited reparation suggestion and precautionary measures after reparation completes, system in described vulnerability scan storage covering current network and data leak.
2. network security vulnerabilities scanning according to claim 1 and management system, it is characterized in that: this system also comprises wireless security module, wireless security module finds wireless device, terminal and model distribution situation in institute overlay area in real time, assists to identify rogue wireless equipment, terminal.
3. network security vulnerabilities scanning according to claim 1 and management system, it is characterized in that: described scan module adopts gradual scanning analysis mode, the identification of employing operation system fingerprint, intelligent miniport service identification accurately present the information of sweep object.
4. network security vulnerabilities scanning according to claim 1 and management system, is characterized in that: the leak quantity in described vulnerability scan is more than 12000 kinds.
5. network security vulnerabilities scanning according to claim 4 and management system, is characterized in that: described vulnerability scan keeps fortnightly regular vulnerability database to upgrade, and upgrades immediately when finding great leak.
6. network security vulnerabilities scanning according to claim 1 and management system, is characterized in that: described system provides 15 kinds of scanning strategies.
CN201610026034.7A 2016-01-15 2016-01-15 Network security vulnerability scanning and managing system Pending CN105471919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610026034.7A CN105471919A (en) 2016-01-15 2016-01-15 Network security vulnerability scanning and managing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610026034.7A CN105471919A (en) 2016-01-15 2016-01-15 Network security vulnerability scanning and managing system

Publications (1)

Publication Number Publication Date
CN105471919A true CN105471919A (en) 2016-04-06

Family

ID=55609189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610026034.7A Pending CN105471919A (en) 2016-01-15 2016-01-15 Network security vulnerability scanning and managing system

Country Status (1)

Country Link
CN (1) CN105471919A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220742A (en) * 2017-04-13 2017-09-29 中国南方电网有限责任公司超高压输电公司曲靖局 A kind of development of information system common support method analyzed based on system vulnerability and platform
CN109088790A (en) * 2018-07-20 2018-12-25 南京方恒信息技术有限公司 A kind of scanning of multi engine exposed assets and management system
CN111538994A (en) * 2020-04-20 2020-08-14 中科三清科技有限公司 System security detection and repair method, device, storage medium and terminal
CN112738068A (en) * 2020-12-25 2021-04-30 北京天融信网络安全技术有限公司 Network vulnerability scanning method and device
CN114884719A (en) * 2022-04-29 2022-08-09 广州市昊恒信息科技有限公司 Network equipment security vulnerability early warning system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683377A (en) * 2013-11-27 2015-06-03 上海墨芋电子科技有限公司 Mass data backup and restoration method for cloud computing cluster group in new technology
CN104683378A (en) * 2013-11-27 2015-06-03 上海墨芋电子科技有限公司 Computing and debugging system for novel cloud computing service platform adopting new technology

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683377A (en) * 2013-11-27 2015-06-03 上海墨芋电子科技有限公司 Mass data backup and restoration method for cloud computing cluster group in new technology
CN104683378A (en) * 2013-11-27 2015-06-03 上海墨芋电子科技有限公司 Computing and debugging system for novel cloud computing service platform adopting new technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田小平: "涉密信息系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220742A (en) * 2017-04-13 2017-09-29 中国南方电网有限责任公司超高压输电公司曲靖局 A kind of development of information system common support method analyzed based on system vulnerability and platform
CN109088790A (en) * 2018-07-20 2018-12-25 南京方恒信息技术有限公司 A kind of scanning of multi engine exposed assets and management system
CN111538994A (en) * 2020-04-20 2020-08-14 中科三清科技有限公司 System security detection and repair method, device, storage medium and terminal
CN112738068A (en) * 2020-12-25 2021-04-30 北京天融信网络安全技术有限公司 Network vulnerability scanning method and device
CN114884719A (en) * 2022-04-29 2022-08-09 广州市昊恒信息科技有限公司 Network equipment security vulnerability early warning system

Similar Documents

Publication Publication Date Title
CN105471919A (en) Network security vulnerability scanning and managing system
CN103281177A (en) Method and system for detecting hostile attack on Internet information system
CN106407813B (en) Heterogeneous vulnerability scanner data normalization processing device and method
CN101593253A (en) A kind of rogue program determination methods and device
CN102467633A (en) Method and system for safely browsing webpage
CN106557695A (en) A kind of malicious application detection method and system
CN109376537B (en) Asset scoring method and system based on multi-factor fusion
CN111835781B (en) Method and system for discovering host of same source attack based on lost host
CN106506545A (en) A kind of network security threats assessment system and method
CN102567674A (en) Method and equipment for judging whether software contains viruses or not on basis of behaviors
CN103441869A (en) Vulnerable main machine recognition method and device of power system
CN111314292A (en) Data security inspection method based on sensitive data identification
CN111985192A (en) Web attack report generation method, device, equipment and computer medium
KR20190099816A (en) Method and system for detecting counterfeit of web page
CN105429996A (en) Method for intelligently finding and locating address translation equipment
CN110636077A (en) Network security protection system and method based on unified platform
CN117590278A (en) Transformer fault detection method, device, equipment and medium based on power cabinet
KR101624276B1 (en) Method and apparatus for detecting icon spoofing of mobile application
CN105516193A (en) Network security configuration checking management system
CN115643044A (en) Data processing method, device, server and storage medium
CN113721960A (en) Application program bug fixing method and device based on RPA and AI
CN112464249A (en) Asset equipment attack vulnerability repairing method, device, equipment and storage medium
CN111209149A (en) Server stability testing method and system
CN112651447B (en) Ontology-based resource classification labeling method and system
CN109409127A (en) Generation method, device and the storage medium of network data security strategy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160406