Font Size: a A A

Study And Implementation Of Key Technologies In Network Security Scanning System

Posted on:2008-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y YangFull Text:PDF
GTID:2178360242499197Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of computer network, network information security has become the key element of keeping country's security and social stability. Security scanning technology is a very effective and initiative defense one that can detect hidden insecurity and can provide a comprehensive protection for the network. So, security scanning technology has become a hotspot of study. The existence of plentiful vulnerability is a menace to the safe of network system. It has significant meaning in researching network scanning technology. From the perspective of administrators this thesis discusses study and implementation of the network security scanning technology and the network security scanning system.This thesis analyses network security scanning technology, and studies the structure of the Nessus, the principle of work as well as the related technology. In order to meet the demand which the multi-subnet environment network vulnerability scanning, the thesis presents a distributed deployment of the scanning system architecture. Many scanners deployed as the server side to the subordinate network, and the web server deployed as the client side deployment in central, the administrator operates the web server through a browser, and carries on the centralized management to the scanners, as well as to realize distributed network security scanning to the large-scale network. In view of the distribution network security scanning system, this article proposes a policy of Scanning servers deployment strategy and a distributed scanning scheduling algorithm, according to the position of the scanning target to optimize the distribution of the scanning sub-tasks, thus enhances the scanning speed in the guarantee scanning rate of accuracy foundation. The paper expounds the design and realization of a distributed network security scanning system. The test results indicate that: the system can not only work well, but also be highly efficient and expansibility.
Keywords/Search Tags:Network Security Scanning, Vulnerability, Plugin, Script, Nessus, SSL
PDF Full Text Request
Related items