Font Size: a A A

Research Of Penetration-oriented Network Scanning Technology

Posted on:2012-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:P Y TaoFull Text:PDF
GTID:2178330338993325Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The network has been employed far and wide in various fields, with increasingattention laid on the development of the internet security. The scanner technology hasbecome an important tool for network security. The modern military computer systemis taking form, and fighting style based on the information system has become theimportant content in the military field. The tendency of attacking the computernetwork is more and more evidently shown, with some countries entrusting the armedforces with explicit network attack tasks. Security-scanning technique plays a veryimportant role in the network attack and defense. To enhance the development of ournetwork attack technique and to defend our network system, security-scanningtechnique must be deeply studied.For the purpose of implementing network penetration, this paper probes into theconventional scanning techniques of network security fields, emphasizing on theusability, applicability and restriction of vulnerability scanning technology, portscanning technique, the ARP scanning technique and stealth scanning technology innetwork penetration areas. Given high requirement on the safety and concealmentdemand of scanning, the author is committed to improving the concealment of theexisting scanning techniques. A new evaluating method to calculate the concealmentis put forward in this paper in order to make a comparison of different scanningmodes. This method is elaborated and its efficiency analyzed from a theoreticalperspective.At the latter part of the paper, a penetration-oriented network scanning softwareis designed with the research achievement on comprehensive utilization of scanningtechnology. The hidden scanning mode based on the flow control in chapter 4 isverified.
Keywords/Search Tags:network attack, security scanning, data stream control, stealth scanning
PDF Full Text Request
Related items