Font Size: a A A

A Research Of Synthetically Analysis And Evaluation Model On Information System Security Vulnerability

Posted on:2006-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y G TangFull Text:PDF
GTID:2168360155965844Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Along with the extensive thorough usage of Internet, the secure events of the network takes place frequently which it lead to the economy losing more and more heavy and the political influence more and more serious. While in these secure events, a majority of is that the network system exists the security vulnerabilities. So how discover and repair these existent security vulnerabilities become the current hot topic research. Aim at this sever situation, the people designed network security vulnerability scanner system. Why they so-called it is that they can automatically scan latent vulnerabilities of the computer system and network equipments. However for these scan systems, on the one hand ,they are based on the rule of vulnerabilities database mostly, existing to fail to report, misinformation phenomenon; On the other hand, owing to the tested target's soft and hardware equipments renewal and technical developments, these vulnerabilities may be not detected. So, dig deeply vulnerabilities and improve precision of scan becomes the soul of scanning the system.Aiming at this kind of circumstance, the dissertation does the following works through the foundation of TCP/IP protocol analysis: researching the current vulnerability scan techniques, introducing the necessity of safety scan and security scan's step and the classification. Scan technique include port scan and vulnerability scan which the latter base on the former. The text elaborates their technique and points out the direction of the vulnerability scan technique future development. Then aiming at the network attack based on network vulnerabilities, it is introduced and classified. These attacks are divided into the four major types generally, namely: Information collections attacks, Denial of Service attack, used attack and cheats attack. These further explicit diversities attack parameter.Combined the technical research of the network vulnerabilities scan and theanalysis to network attacks, we know that regardless the vulnerabilities scan or the network attacks would cause the system resources of variety, even appear the abnormality. It is the point of departure that this dissertation analyses these problems. Basis on this, from another angle, this dissertation is putting forward the thought of vulnerability Synthetically analysis and evaluation. Make use of the network detection procedure to cause the system resources variety and the information resources mutually affect, we set up a kind of information resources mathematical model which describes the ways about vulnerabilities evaluation and detailed analysis.At the last of the dissertation, we design a kind of synthetically analysis and detection vulnerability model that include vulnerabilities detection module, information feedback module and the synthesis judgment module. The first module is made up of a kind of scan tool or several tools that include information explore module and vulnerabilities detection module. The function of the former insures only on detecting on-line host for the latter. As we all know that this help to improving the latter high-efficiency. As to the information feedback module, it can collect the target system resources variety information through network management system, then feedback to the test system. The last module use the established mathematics model to analyze and calculate, According to these resource points and relativity points, we can forecast the existence of vulnerability. To some extent, this ways improve digging unknown the efficiency and depth of vulnerability, providing a kind of useful way of testing for the analytical detection vulnerabilities.
Keywords/Search Tags:TCP/IP protocol vulnerabilities scan technique research, network attack, synthetically analysis and evaluation, model design.
PDF Full Text Request
Related items