Font Size: a A A

Design And Implementation Of Network Vulnerabilities Scanning System

Posted on:2006-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:D ZhouFull Text:PDF
GTID:2168360155458385Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid development of the information technology brings great benefit to us, at the same time, it brings more threats to us. As we put more and more private and important information on the network, we become more and more rely on network. And there are more and more people are interested in hacking, as they can get hacking tools from Internet easily. In this case, the problems of network security are paid more attention to and the studying of network security is very important to protect our valuable information.Usually hackers or computer virus intrude a computer system by security holes. So we can secure computer systems by detecting the holes before their attacking. In order to perform a successful network attack, an attacker also need firstly gather vulnerability information of the target networks. The function of gathering vulnerability information is often provided by network vulnerability scanning tools.This article firstly discusses the definition, source, characteristic, attribute and detecting methods of vulnerability. Then the technology used in network vulnerability scanning is introduced which includes port scanning, remote OS identification, vulnerability scanning, plugin technology and some network programming technology. After that, the article pays attention to the theory of how it works and how we can make good use of it.Based on the above, this article focuses on the design and implementation of a network vulnerability scanning system which named NetScanner. NetScanner is a network oriented system, it can gather information and vulnerability of remote systems. After scanning it can make particular reports and solutions to the found vulnerability, so it brings great benefit to network administrators.At last the article analyzes the functions and components of NetScanner system which is implemented in the article. The system works fine whether the scanning target is a single host or a network, by testing we can make the conclusion that we meet the desire we designed.
Keywords/Search Tags:network security, network attack, vulnerability, vulnerability scanning
PDF Full Text Request
Related items