Font Size: a A A

Design And Implementation Of Network Vulnerability Scanner

Posted on:2008-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2178360212474744Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the increasing popularity of computer network, the security problems of the network take place frequently. Most of these security problems are caused by system vulnerabilities or software vulnerabilities. In order to reduce security problems and improve the security quality of system, we can detect the places of the system's vulnerabilities by using the vulnerability scanning technologies. This thesis introduces the vulnerability scanning technologies, such as ICMP scanning, port scanning and OS scanning. Based on above, it describes the implementation of a prototype network vulnerability scanner.This prototype system detects the target host's vulnerabilities by simulating hacker's attacks. After scanning, it can make reports to the found vulnerability, so it brings great benefit to system administrators. The prototype system can help the administrators to know the security situation of network faster and timely. In addition, this prototype system uses plug-in technology to strengthen the expansibility, so it can support to detect the new vulnerabilities.At last the thesis analyzes the functions and components of the prototype system which is implemented in the thesis. And it presents the results of test to prove the feasibility of this prototype system.
Keywords/Search Tags:vulnerability, network security, vulnerabilities scan, plug-in
PDF Full Text Request
Related items