Font Size: a A A

Research On The Technique Of Information Security-oriented Network Scanner

Posted on:2005-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:P LiuFull Text:PDF
GTID:2178360182972383Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The network security has been paid more attention with the development of the Internet. The scanner has become an important tool for network security. The existence of plentiful vulnerability is a menace to the safe of network system. The research on how to scan vulnerability is avail for finding out the deficiency of the computer system. The illogical design in the Internet framework will also provide a channel for attack, so it is important to find out the weakness in the framework. In order to increase the efficiency of scanner, the traditional mode of scanner should be improved much.In this paper, there are some innovations as follows:(1) Much vulnerability have been collected and classified, some familiar vulnerabilities are introduced in this paper.(2) The theory of scanner is defined in this paper; four kinds of scan methods are introduced and analyzed by some examples.(3) At the base of the arithmetic of topology discover, a new arithmetic about how to scan long-distance computer's topology is given.(4) In order to establish a good scan policy, more information about the goal computer should been collected by sending some TCP/IP messages. So the detection scan will became a new function for the scanner.
Keywords/Search Tags:long-distance scan, vulnerability, network protocol and application, detection, network topology, heuristics and guessing
PDF Full Text Request
Related items