Font Size: a A A

The Design And Implementation Of Vulnerability Collection Function In IMS Security Evaluation

Posted on:2010-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:H SunFull Text:PDF
GTID:2178360278965930Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
IMS is short of IP multimedia, which can provide voice data and video services, based on IP network. It is thought to be the evolution direction of the next generation network. IMS Security Awareness Evaluation System mainly recognizes and analyses asset, vulnerability and threat information of IMS, and does some risk calculation. IMS Security Test Evaluation Software is made up of data collection module, data analysis module, data output module and general management module. Data collection modules is the foundation of IMS evaluation system, which collects raw asset, vulnerability and threat data of IMS according to the tasks from the general management module, and makes these data format unified, and export the metadata to data analysis module for the next process.This dissertation mainly introduces the design and implementation of vulnerability function of data collection module. The dissertation utilizes the mature model of network security evaluation system, and proposes the ways of vulnerability data collection based on Nessus for the purpose of diversity and distribution of the data.This thesis is separated into six chapters. The chapter one introduces the research background and main work accomplished during the paper writing process. In the chapter two, introduce technology related to IMS and security evaluation. In the chapter three, is about the requirement analysis of the IMS risk evaluation system and vulnerability data collection. In the chapter four, the design and implementation of the vulnerability and some detailed introduction of main modules. In the chapter five, is about the test. Finally, the gains and prospects I have been awarded of in the process of writing this paper are summarized.
Keywords/Search Tags:ims, risk assessment, data collection, vulnerability, nessus
PDF Full Text Request
Related items