发明名称 SYSTEM PENETRATING A COMPUTER OR COMPUTER NETWORK
摘要 A computer network penetration test discovers vulnerabilities in the network using a number of scan modules. The scan modules perform their scanning of the network separately but in parallel. A scan engine controller oversees the data fed to and received from the scan modules, and controls the sharing of information among the modules according to data records and configuration files that specify how a user-selected set of penetration objectives should be carried out. The system allows the penetration strategies to be attempted simultaneously and independently. Information from each strategy is shared with other strategies so each can be more effective, and together they form a very comprehensive approach to network penetration. The strategies can be throttled at different levels to allow for those that are more likely to achieve success to run at the highest speeds. While most strategies collect information from the network, at least one dedicated one analyzes the data produced by the others according to a series of rules. This analysis reduces and refines data and simplifies the design of the various strategies. Data obtained through the various strategies are stored in such a way that new data types can be stored and processed without all the strategies having to be adjusted. Strategies are run according to whether or not they can help in achieving a specified objectives. The vulnerability scan is initiated by a user who specifies what targeted network resources to scan. From that point on, the scan is data driven and models how an unwanted attacker would gain unauthorized access to the system.
申请公布号 WO0038036(A2) 申请公布日期 2000.06.29
申请号 WO1999US30850 申请日期 1999.12.22
申请人 AXENT TECHNOLOGIES, INC.;KINGSFORD, BRYAN;MCQUEEN, STAN;THROWER, WOODROW, AARON 发明人 KINGSFORD, BRYAN;MCQUEEN, STAN;THROWER, WOODROW, AARON
分类号 G06F1/00;G06F11/14;G06F11/30;H04L29/06;(IPC1-7):G06F1/00 主分类号 G06F1/00
代理机构 代理人
主权项
地址
您可能感兴趣的专利