Font Size: a A A

Research On Extensible Policy-Driven Network Vulnerability Scanning

Posted on:2007-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:M F YanFull Text:PDF
GTID:2178360185476470Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization of information technology and network culture, system security, network intrusion and hacker skill are becoming hot topics. While information technology makes people more convenient and effective, the requirement for information technology security is also getting more urgent. Nowadays more and more people are getting interested in hacker skill, along with the increasing of the hacker websites in the Internet and free downloading of the hacker tools, the threshold to be a hacker is getting lower and lower. Meanwhile, various viruses emerge with more harm, higher frequency and spread speed, information security management is suffering tremendous pressure.Generally, hacker and virus intrude a computer system by exploiting some security vulnerability. As long as all the security vulnerabilities are found and fixed, almost all the hacker attack and virus intrusion will be prevented. Security vulnerability scanning can detect the underlying security vulnerabilities in a system, so the network manager can know in advance where the weakness of the network is by using security scanning, then fix and patch these vulnerabilities in time, and the network security will be ensured consequently.This thesis at first introduces the definition, the cause, characteristic, category of vulnerability, and some key technologies to implement network vulnerability scanner, including the principle of port scanning, vulnerability scanning and the two methods of vulnerability scanning such as knowledge matching and attack simulation.Then, each attribute of vulnerability is analyzed in detail combined with vulnerability scanning, how to detect a vulnerability using the various attributes of the vulnerability is discussed in the thesis. Based on all these analysis, the...
Keywords/Search Tags:network security, vulnerability scanning, information gathering, policy-driven
PDF Full Text Request
Related items