Font Size: a A A

Design And Implementation Of Security Network Vulnerability Scanner System

Posted on:2008-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LuoFull Text:PDF
GTID:2178360242999328Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Vulnerability is defined as the security flaw of hardware, software and protocol's implementation or system security strategy of computers. Vulnerabilities will grant attackers the permissions of intruding into the systems or accessing the resources without authorization or destroying the systems.According to the report of US-CERT, 99% of the incidents reports of intrusions is based on the known vulnerabilities, so it is significant for network security that the known vulnerabilities of systems must be detected and repaired. But general personal computer users find it hard to test whether their system is vulnerable.This article firstly discusses the definition, source, characteristic, attributes and detecting methods of vulnerability. Then the technologies used in network vulnerability scanning system are introduced which includes port scanning, remote OS identification, vulnerability scanning plug-in technology and some corresponding network programming technologies. After that, this article pays attention to the principle of how the network vulnerability scanning system works and how we can make good use of it.Based on the above, this article focuses on the design and implementation of a security network vulnerability scanning system.The system is a network oriented system. It can gather information and vulnerability of remote systems. After scanning the system can make particular reports and solutions to the found vulnerabilities, so it brings great benefit to network security administrators.At last this article analyzes the functions and components of the system which is implemented in our reserch. This article focuses on the key techniques such as the design of the database based on CVE, the technique of the vulnerability detection by improving OVAL , verification by simulating the attack behaviors , and the implementation of the vulnerability repair scheme.
Keywords/Search Tags:Network security, vulnerability, Vulnerability scanning, detection and repair of vulnerability
PDF Full Text Request
Related items