Font Size: a A A

The Design And Implementation Of Network Vulnerability Scanning System Based On Plug-in Technology

Posted on:2012-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:X G GongFull Text:PDF
GTID:2178330335960430Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of national economy, politics, economy, culture and social life are getting more and more dependence to the communication network, which including the public telecommunication network and the public Internet. The communication network has become the key infrastructure of our country, and its overall important strategic position is prominent day by day. Meanwhile, with the enhancement of the communication network opening, the communication network is facing more and more internal and external security threat, the network security event happened frequently, and alternative security problems such like network attack and information steal are prominent.Therefore, in response to the more and more serious trend of network security, and in order to improve the capability of the protection of national communication network security and the prevention of network security incidents, the Ministry of Industry and Information Technology carry out a comprehensive movement of the protection of national communication network security.Through the summary of the former national communication network security protection work, I found that the risk assessment of the security protection work worker with the methods of the examination of technology documents and the interview of attendants. This way is unable to detect the vulnerabilities of the computers in the communication network, and the working efficiency is low. With the computers in the communication network are more and more important, and more and more become the goals of hacker attack, it is obviously important to create a network vulnerability scanning system to detect the vulnerabilities.In this paper, I analyze the principle and method of network vulnerability scanning firstly through research the network vulnerability scanning technique deeply. Then I introduce the national network security situation and the national communication network security protection. In the base of the problems which exist in the former national communication network security protection work, I propose the demand of RITT network vulnerability scanning system, and design the architecture, work process, and each functional module of the system in detail, and realize this system. Finally, I test this system under the laboratory environment to proof its accuracy and the validity, and then I use this system in the 2010 national communication network security protection inspection, which made a good result.
Keywords/Search Tags:network security, security protection, risk assessment, vulnerability scan, plug-in technique
PDF Full Text Request
Related items