Font Size: a A A

Design And Implementation Of The Next Generation Network Based Vulnerability Database System

Posted on:2009-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:T T SunFull Text:PDF
GTID:2178360245470020Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the telecommunication technologies develop more and more quickly, the telecommunication network is developing towards more open and flexible next generation network. Next generation network is an open and synergetic network, developing towards softswith based and all-IP based network. As IP network inherent vulnerability, in a succession of IP network vulnerability at the same time, the next generation network have some potential security problems in the network architecture, protocol and management, and other aspects. In order to store the vulnerabilities, the establishment of a next-generation telecommunications networks based vulnerability database system is very necessary for the network security.In this paper, I researched the current mainstream of the vulnerability of the open-source database system and processed a comparative analysis of their strengths and weaknesses expecting to find out something that we can learn from. We can use these open source databases from the two aspects. The first one is access to information, a large number of data sources can be comprehensively and timely added to our database as new contents. In the data model design, we can draw on the design of these databases.This system is an internal used database system for the next generation telecommunications network risk assessment. I analyzed the needs of the system from the application scenarios, application model and roles analysis. I classified the vulnerability data to determine the description of the vulnerability data, designed the entity relationship model, and designed the data model of this system.There is a management system in this system which is an important part. This management system provides user-friendly interface by WEB which allowed user to operate and manage vulnerability data. I raised the overall design of the management system, the life cycle of the vulnerability entry, the system processes, as well as the implementation of the management system prototype.Finally the author concluded the work during the subject research, and raised the work in the next phase.
Keywords/Search Tags:Next Generation Network, Vulnerability, Vulnerability Database System, Risk Assessment
PDF Full Text Request
Related items