An Efficient Method for Scheduling Massive Vulnerability Scanning Plug-ins
نویسندگان
چکیده
More and more security vulnerabilities were found in network softwares nowadays, making network security assessment one of the most important tasks for IT administrators. Vulnerability scanner is the key application for fulfilling such tasks. However, large numbers of vulnerabilities result in even larger number of vulnerability plug-ins including common plug-ins and specific plug-ins, which may involve complex dependencies. Therefore, how to schedule such large number of plug-ins in an efficient manner is a key problem for improving the performance of vulnerability scanners. We analyze the current algorithms and find that they doesn’t take the dependencies into consideration or doesn’t handle it properly, which would waste a considerable CPU time for scanning. This paper proposes an efficient plug-in scheduling algorithm based on DAG graph. We formalize plug-in scheduling as a tree-like topological sorting problem using DAG theory, in which multi-thread is treated as task lines and all plug-ins are deployed on the task lines. Each task line is occupied by the plug-ins for a period of executing time and waiting time. By constructing the DAG graph of all plug-ins and computing their “height” value, sorting the plug-ins and aligning them to a linked list for scheduling, we solve the plug-in dependency problem properly, therefore eliminate the possibilities that nonready plug-ins being scheduled to execute. We carry out experiments to validate the effectiveness of our algorithm.
منابع مشابه
THAPS: Automated Vulnerability Scanning of PHP Applications
In this paper we describe the THAPS vulnerability scanner for PHP web applications. THAPS is based on symbolic execution of PHP with specialised support for scanning extensions and plug-ins of larger application frameworks. We further show how THAPS can integrate the results of dynamic analyses, generated by a customised web crawler, into the static analysis. This enables analysis of often used...
متن کاملHandling Aperiodic Tasks in Diverse Real-Time Systems via Plug-Ins
Functionality for various services of scheduling algorithms is typically provided as extensions to a basic algorithm. Aperiodic task handling, guarantees, etc., are integrated with a specific basic scheme, such as earliest deadline first, rate monotonic, or off-line scheduling. Thus, scheduling services come in packages of scheduling schemes, fixed to a certain methodology. A similar approach d...
متن کاملDetailed Modeling and Novel Scheduling of Plug-in Electric Vehicle Energy Storage Systems for Energy Management of Multi-microgrids Considering the Probability of Fault Occurrence
As an effective means of displacing fossil fuel consumption and reducing greenhouse gas emissions, plug-in electric vehicles (PEVs) and plug-in hybrid electric vehicles (PHEVs) have attracted more and more attentions. From the power grid perspective, PHEVs and PEVs equipped with batteries can also be used as energy storage facilities, due to the fact that, these vehicles are parked most of the ...
متن کاملBrowser security
The past decade has shown that the browser is a vulnerable application. Vulnerabilities are still frequently being discovered for all browsers. Besides this, a typical browser has more than one plug-in installed and through the vulnerabilities associated with plug-ins fully patched browsers are at risk. Even if a browser and its plug-ins are patched and no vulnerabilities are known, the browser...
متن کاملTowards the evaluation of the LarKC Reasoner Plug-ins
In this paper, we present an initial framework of evaluation and benchmarking of reasoners deployed within the LarKC platform, a platform for massive distributed incomplete reasoning that will remove the scalability barriers of currently existing reasoning systems for the Semantic Web. We discuss the evaluation methods, measures, benchmarks, and performance targets for the plug-ins to be develo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 8 شماره
صفحات -
تاریخ انتشار 2013