Font Size: a A A

Distributed Vulnerability Scanner Design Based On Electronic Government Affair Network Platform

Posted on:2005-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:W F ZouFull Text:PDF
GTID:2168360122467552Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this paper,under the background of "Digit FuJian" electronic Government affair network platform the means used by hackers to intrude computer network systems have been thoroughly discussed and analysed .And the primary causation of intruding into a network- the security leaks of a system was pointed The architecture of distributed vulnerability scanner is introduced.Making use of existed technology of vulnerability scanner and combined the distributed character of electronic Government affair network platform,studying on the theories of security scanning products inexistence, a new type of network vulnerability scanner system model was introduced and designed. The system itself took distributed agent software as the core,with the designing in the service of different construction and quality network platform. Due to the agent distributed characteristics, it can be amply adapted to the detection of dispersive vulnerability.In this paper ,the details of system model are introduced.The makeup of scanner agent and details of every aspect of agent are alse introduced and designed. The patternized detecting system is more easily to expand and extend in the face of new security vulnerability, so it guarantees possibilities and flexibilities of adjusting detecting system in dynamic state as the network functions change. In the paper the basic knowledge of Socket programming is introduced.For users' convenience ,the technology of WEB is employed. In order to solute the security of Distributed scanner ,the SSL protocol is employed.The system is suitable for trans-platform motion, it has very excellent portability, expansion and flexibility, especially fit for checking and analyzing of variable platform network's vulnerability.In this paper, the realization of part of system is presented .The key code is also presented.In the procedure of realization of system, much attention on the convenience of use and the good interface of configuration is paid.Further more , correctness of vulnerability report is also taken into account.At last ,the paper is summarized.
Keywords/Search Tags:vulnerability scanner, distributed, scanner agent, network security
PDF Full Text Request
Related items