SYSTEM AND METHOD FOR DETECTING SERVER VULNERABILITY
First Claim
1. A system for detecting vulnerability of servers, comprising:
- a check server, wherein the check server collects response information received from one or more service servers in response to at least one predetermined command and detects vulnerabilities of the one or more service servers based on the collected response information;
an administration terminal, wherein the administration terminal displays results of detecting vulnerabilities of the service servers; and
a database, wherein the database stores pattern information concerning the vulnerabilities of the service servers.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for detecting vulnerability of a server are provided. One system includes: a check server for collecting response information with respect to at least one predetermined command from one or more service servers that provide service, and thus may be attacked from outside, and detecting and analyzing vulnerabilities of the service servers based on the collected response information; an administration terminal for displaying the results of detecting and analyzing the vulnerabilities of the service servers; and a database for storing and managing pattern information concerning the detected vulnerabilities. One method includes identifying a server that may be attacked by port scanning, receiving response information with respect to at least one predetermined command from the identified server, detecting and analyzing vulnerability of the server based on the response information, and reporting the result of the detection to an administration terminal.
68 Citations
27 Claims
-
1. A system for detecting vulnerability of servers, comprising:
-
a check server, wherein the check server collects response information received from one or more service servers in response to at least one predetermined command and detects vulnerabilities of the one or more service servers based on the collected response information; an administration terminal, wherein the administration terminal displays results of detecting vulnerabilities of the service servers; and a database, wherein the database stores pattern information concerning the vulnerabilities of the service servers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for detecting vulnerability of servers, comprising:
-
a scanner for identifying at least one service server that provides service and thus may be attacked from outside; a collector for collecting response information received from the at least one service server in response to one or more predetermined commands; and an analyzer for detecting and analyzing vulnerability of the at least one service server based on the collected response information. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of detecting vulnerability of servers, comprising:
-
storing, in a database, pattern information concerning vulnerabilities corresponding to one or more service servers; collecting, at a check server, response information from at least one service server in response to at least one predetermined command; detecting and analyzing, at the check server, vulnerability of the at least one service server based on the collected response information; and displaying, at an administration terminal, a result of detecting and analyzing the vulnerability of the service server. - View Dependent Claims (12, 13, 14)
-
-
15. A method of detecting vulnerability of a server, comprising:
-
identifying a service server that provides service and thus may be attacked from outside; collecting response information from the identified service server in response to one or more predetermined commands; and detecting vulnerability of the service server based on the collected response information. - View Dependent Claims (16, 17, 18, 19)
-
-
20. One or more computer-readable media having computer-useable instructions embodied thereon for performing a method of detecting vulnerability of servers, the method comprising:
-
storing, in a database, pattern information concerning vulnerabilities corresponding to one or more service servers; collecting, at a check server, response information from at least one service server in response to at least one predetermined command; detecting and analyzing, at the check server, vulnerability of the at least one service server based on the collected response information; and displaying, at an administration terminal, a result of detecting and analyzing the vulnerability of the service server. - View Dependent Claims (21, 22)
-
-
23. One or more computer-readable media having computer-useable instructions embodied thereon for performing a method of detecting vulnerability of a server, the method comprising:
-
identifying a service server that provides service and thus may be attacked from outside; collecting response information from the identified service server in response to one or more predetermined commands; and detecting vulnerability of the service server based on the collected response information. - View Dependent Claims (24, 25, 26, 27)
-
Specification