Font Size: a A A

The Design And Implementation Of Hole Detection Middleware

Posted on:2006-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:S J YiFull Text:PDF
GTID:2168360152994543Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Computer security is a matter of great urgency in the process of information integrating. Finding security hole is very important to protect system security. Using hole scanning technology we can detect the latent security hole in the network system and make the network administrators know the places of the security holes in advance, then guarantee the security of system. The cost, extension and interoperation have become the bottleneck of the scanning system, but these problems could be solved by middleware. Middleware is the software between the application and the operation system, it constitutes the basic truss of the application. Upon the middleware, new application can be created or an existed application can be reused. Middleware provides the basic function for the key application: screening the hardware and network, providing communication mechanism, optimizing communication performance, servicing location transparency, enhancing expansibility, providing transaction management mechanism, ensuring consistency of the transaction and the data and guaranteeing the security of applications.By analyzing the middleware technology and vulnerability detection technology, this article proposes an architecture of hole detection middleware (HDM). The design idea is that We collect the common data, encapsulate the regulations and separate scanning control from scanning implement, then, construct scanning operation on the public platform and manages the applications of scanning at the low-level.Through the analyzing of the HDM's function and character, this article proposes a solution to HDM's system structure design which implemented the design of components, finished the type choice of middleware and the design and encoding of some main classes.HDM adapts modular design technique, gives uniform interface, and has good encapsulation and extensibility. It separates scanning control from scanning implement, realizes the control of many hole detection program, and masks their difference. HDM has compatibility so it can be reuse easily. Using middleware technology we can ensure HDM work efficiently, steady and safety.Based on the request and character of hole detection technology, this article establishes a distributing scanning task scheduling model, describes a scanning task distributing algorithm and validates the superiority of our model in theory.At present, the research about security middleware all concentrates on the combination of middleware technology and security static defensive technology. This paper extends to the combination of middleware technology and detection technology, which promotes to the development of middlesware in the security field.
Keywords/Search Tags:hole detection, middleware, UML, EJB, task scheduling
PDF Full Text Request
Related items