I. Introduction
The current protection system is mainly composed of three major systems: Remote Security Assessment System (RSAS) [1], [2], Intrusion Prevention System (IPS) [3~5] and Benchmark Verification System (BVS) [6~7]. The innovation of RSAS is that the central scanner can be used for the unified management of the deployed lower level scanners and the scanning task, and the results of scanning are also checked. IPS is a computer network security device which can monitor the transmission behavior of a network or network equipment, can immediately interrupt, adjustment or isolation of some abnormal or damaging behavior of network data transmission. BVS is a tool for automated checking of the security configuration of network devices and host systems which can realize the analysis of security configuration detection, automatic network assets equipment, and provide professional advice and security configuration compliance report with using efficient and intelligent recognition technology.