Font Size: a A A

The Design And Implementing Of Network Scanning System Yscanner Based On MPI Technology

Posted on:2006-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LuFull Text:PDF
GTID:2168360155461933Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Computer security is a war between the intruder and the administrator. It is not enough to think from either side. A new approach to solve security problem is to consider the system security from an intruder's angle, which requires us to simulate the intruder's common acts to attack the system, to know all the vulnerabilities of system from their point and take relative measures to remedy these security holes. In this way, network security will be enhanced and intruders are prevented from attacking thorough these vulnerabilities. It is significant to take these thoughts into the research of security issues, and design convenient and practical software tools. As proved by facts, system security can be greatly improved by combining the traditional security solution and this new solution. Actually, many companies in the field of network security have now integrated this kind of product into their security solution, such as CyberCop Scanner (NAI), Internet Scanner (ISS), and Netsonar (CISCO).In this paper, the research analyzes the network security requirements and various widely used security solutions in details, also analyzes the intruder's attacking style and route. Based on the research, we have designed a network scanning tool. With MPI (Message Passing Interface), the network scanner, Yscanner, is implemented for large-scale and complicated network environments. The learning covers how to ensure network security from technical point of view. The tool can be used to detect security problems in target network nodes and respond to these security vulnerabilities. Some security vulnerabilities had been found in practical use of this tool. It is proved that Yscanner has high-level practical value, high speed, expandable, secure and user-friendly interface. If we keep the scanning contents updated timely following a main vulnerability list, we can ensure practicability of the scanner, so the scanner can play an important role in network security solution.This paper first introduces network security related contents including the background, the concept of the network security and the threats against computer networks, and then it studies the technology of network security scanning in details. The mechanisms of commonly used network attack tools are analyzed and possible solutions are also given. The research summarizes the development of intrusion detection tools,...
Keywords/Search Tags:Internet, Network Security, Large-scale Scanning, Network Services, MPI (Message-Passing Interface)
PDF Full Text Request
Related items