Font Size: a A A

The Design And Realization Of Network Vulnerability Analysis System

Posted on:2007-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:H GuoFull Text:PDF
GTID:2178360185997196Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This thesis first analyzed the current situation of the network security, deeply introduced each phase in the process of network attack. Then described the primary measures used by attack side and defense side in the network, and the methods to implement attack and defense, as well as the systematic analysis of the principles for it. In addition, this thesis analyzed the most common and harmful methods or tools to implement attack, such as scan, buffer overflow.The work based on this paper is to design and implement an easy-to-use and powerful computer vulnerability assessment system. This system is for experienced system administrators. The system is Client/Server Structure. The server is running on a linux platform and the client is running on a windows platform. User can operate the server only through a mini-functional shell. The server receives commands from the client and doing scanning job and logging any operations. The client offers task management, policy management, user management and other functions. There are two methods which could be used to generate the report of this system: Relational Database System + Database Access Applications, XML +XSL. We give out a comparison of the two methods in details in this paper.This system adopts plug-in structure, in the face of new vulnerability that is producing constantly, it is easier to expand, can guarantee the flexibility degree of adjusting system dynamically with change of the function of the network. This text has a detailed explanation to NASL language foundation and relevant function, analyses the structure of NASL script,...
Keywords/Search Tags:network security, port scan, buffer overflow, NASL technology, SSL technology, Crystal Report, XML
PDF Full Text Request
Related items