Font Size: a A A

The Research And Implement Of The Technology Of Vulnerability Scanning Based On The Third-party Platform

Posted on:2014-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:L S WangFull Text:PDF
GTID:2248330395998613Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In this paper, we study the principle of the vulnerability scanning system and realize the system based on the Nessus. It makes full use of the Nessus plug-ins which is easy to compose and to scan holes efficiently and fast to realize that the system scan the target hosts efficiently. The work and research in this paper are mainly as follows.(1) We design the plug-ins in plug-in library. We improve the scalability of the system in the use of the technology of plug-in and provide support to add new plug-ins.(2) We design a vulnerability scanning system based on Nessus and design the framework and function of system and the process of program in detail.(3) We construct an experimental platform. In the platform, we use the Nessus plug-ins scan the loopholes of the system.(4) The vulnerability scanning system returns a scanning report which was used to help network administrator to check the security situation of network quickly.We introduce the implementation of some major plug-ins after the related function modules and components. Finally, we confirm the system is effective through the experiment.
Keywords/Search Tags:Internet, information security, vulnerability scanning, Nessus plug-in
PDF Full Text Request
Related items