Font Size: a A A

The Design Of An Integrative Scan System Based On Vulnerability Scan

Posted on:2007-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y MaFull Text:PDF
GTID:2178360185466363Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of information technology, computer and internet make people's life becomes better and better, at the same time, information security becomes an important focus, and security evaluation becomes an influential instrument to protect information systems. During the information security risk assessment work, to gain the system' s information about security condition was an essential step, the data' s accuracy has decided the evaluation work' s accuracy.In this paper, the author aims at finding out a kind of integrative scan system, and provides evaluation with technology support. This system was designed to meet the needs of information system security evaluation, scan the vulnerability, open ports and service, and report the exist vulnerability, risk level, security status and so on.In order to do that, the fundament and features of vulnerability scan technology were researched, the author also analyses the develop trends, and classify the security scanner systems, analyses the commonly system structures. Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed. In addition, the operating system stack finger printing was also researched, included active identify and passive identify. On this basis, a kind of integrative scan system model was put forward, which falls together the vulnerability scanner and operating system stack finger printing tools, adds additional modules, and designs graph user interface module and database scheme, the entirely target is to design the system could scan vulnerabilities, monitor network data, and...
Keywords/Search Tags:Security evaluation, Network security, Security scanning, Finger Printing
PDF Full Text Request
Related items