Font Size: a A A

Designed And Implementation Safety Scanner Based On Vulneribilty Database

Posted on:2006-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:G GuoFull Text:PDF
GTID:2178360212475817Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of information technology, we are now stepping into an information society. People must have faced to new challenge in now days, which is network problem. At this time, safety of network is most outstanding in China. Vulnerability existed have been reason that safe affairs was occurred. System vulnerability is the flaw in the design and implementation of computer system's hardware, software or protocol. It is the most reason of leading to security incident.The first, we discussed the definition, characteristic of the vulnerability and the principle of vulnerability classification in this paper. Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.At last, the paper accord to the research of vulnerability database development domestic and international, analyze existed database characteristics and base on demand of the vulnerability scanner to improve vulnerability database. Vulnerability database in the paper can be automatically updated to use vulnerability crawler. In this process, we designed and carried out a vulnerability scanner. This scanner adopted Console/Database designed model based on vulnerability database and can be automatically updated plug-in in the plug-in updating module of vulnerability scanner.
Keywords/Search Tags:Vulnerability, OS detection, Port, Vulnerability crawler, Plug-in, Console/Database
PDF Full Text Request
Related items