Font Size: a A A

Design Of Vulnerability Scanning System Based On Plug-in Technology

Posted on:2008-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z H LiangFull Text:PDF
GTID:2178360212975674Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network and communication, it 's a trend to communicate with open network. But it also a risk to use the convenient resources of network .Usually hackers and computer virus intrude a computer system by security h oles. the system can be secure by detecting the holes by network administrators. So the vulnerability scanning technology becomes an important security technology.the article analyses about several key technology for network security scanning and summarises its principles as well as merits and demerits of each technology. By the analysis of it 's strategies and methods , we have paved the way for improving a better network security system.Being powerful is the most important factor for a network security system, the article designs a powerful security holes scanning system , presents the design of aim, system models, relation flows and key technologies,and realise the system's using.Finally, the article also analyses its security system and applicative traits,tests the system,and compares the security holes scanning system with other system,it's powerful and safty. proves the feasibility of the system.And administrators of network security can search the vulnerabilities and security holes of network, take remedial measures, and strengthen security defense. So it has some practical guidance for the implementation of network security work.The problem about how to control the large network's risk and monitor the alarm of security production is becoming more and more important. Based on the electric power enterprise network, This paper analyzes the needs of the information's security management in a large network. Finally, it provides some methods for building the large network's security operation center.
Keywords/Search Tags:Network Security, Leak Scanning, Invading Test, TCP Protocol, Terminal Scanning, IP, Security Operation Center(SOC)
PDF Full Text Request
Related items