FIELD: information security.
SUBSTANCE: scanning system for network architecture elements contains at least one processor, memory, a module for obtaining data about the network architecture elements, a module for processing received data that checks the correctness of data input and distributes them in the database of the security scanning system, a module for obtaining primary information about the elements of network architecture, while the said information contains at least the data on the availability of a network architecture element, a task generation module, which, based on a set of task templates for the received network architecture element, creates scanning tasks for it, a task launch manager module that, by processing a task execution template connects the necessary scan modules and sends them scanning tasks, at least one module for scanning the security of network architecture elements in the network, which performs the received task, a results analysis module that receives results from the scanning module and finds out if the results contain information about new related elements of the network architecture.
EFFECT: reduced time and amount of required computing resources when scanning elements of the network architecture.
14 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
AUTOMATED SAFETY ASSESSMENT OF BUSINESS-CRITICAL COMPUTER SYSTEMS AND RESOURCES | 2011 |
|
RU2657170C2 |
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS | 2010 |
|
RU2446459C1 |
SYSTEM AND METHOD FOR EVALUATING MALICIOUS WEBSITES | 2015 |
|
RU2622870C2 |
SYSTEM, METHOD AND CONSTANT MACHINE-READABLE MEDIUM FOR VALIDATION OF WEB PAGES | 2015 |
|
RU2632149C2 |
CLOUD SERVICE SECURITY BROKER AND PROXY | 2014 |
|
RU2679549C2 |
SAFE AUTHENTICATION WITH LOGIN AND PASSWORD IN INTERNET NETWORK USING ADDITIONAL TWO-FACTOR AUTHENTICATION | 2016 |
|
RU2635276C1 |
METHOD OF ANALYSING AND DETECTING MALICIOUS INTERMEDIATE NODES IN NETWORK | 2012 |
|
RU2495486C1 |
SYSTEM AND METHOD TO DO SEARCH | 2014 |
|
RU2597476C2 |
IDENTIFICATION OF SECURITY VULNERABILITIES IN APPLICATION PROGRAM INTERFACES | 2017 |
|
RU2755675C2 |
OFFLINE EXECUTION OF WEB BASED APPLICATIONS | 2007 |
|
RU2453911C2 |
Authors
Dates
2021-03-01—Published
2019-12-19—Filed