Font Size: a A A

Research And Implementation Of Information Security Testing Technology Based On Host

Posted on:2011-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:G Y HuFull Text:PDF
GTID:2178360302981909Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
At present, information security is mainly divided into five parts as the follows: physical security, network security, host security, application security and data security. Among them, the host security is in the first floor of the whole information system, it controls and manages all the usable resource and system's circulate. Therefore, It is obvious that the host security is the essential precondition and foundation of the whole computer information system security.This subject stems from the importance of host, developing the software that could implement host security testing. This system scans hosts' vulnerabilities, reports the risk that hosts' may have, suggests corresponding measure to users. At the same time, this subject is exploratory and preparatory design and realization of Liaoning province information security test common technology service platform construction project.This subject contains host port scan, registry permission control, user identification, malicious code defense and the report of scan results. And the vulnerability design that is indispensable for host security test system.Port scan module, it is through initialing the new instance of TcpClient class and use the Connect() method of Socket class to implement design. And report current scanning progress with progress bar during port scanning. This design is convenient to interact with users, and appearance is brief and compact. Registry permission control module, this module is used to set or modify registry permission via embedding windows command regini to C#.NET environment. It is one of the most important means of maintenance host security to lock registry permission which are used by virus commonly. User identification test module, this part tests the relational information of host's user name and corresponding password to ensure host's security. Malicious code defense test module, this module ensure user's host do not attacked by malicious code easily via testing host whether installing the software of defense malicious code, and the relational information of this software, including edition and the renew time, etc.In addition, the design and implementation of vulnerability database is also an indispensable part for host security test software. The vulnerability database of this subject is established based on CVE standard. And this makes it easy to understand and interact for information, enhance vulnerability database's extensibility, be propitious to renew and upgrade the vulnerability database.This subject designed the software of host security test could find the vulnerabilities through scanning the users' host, and giving advice to users to achieve the goal of maintaining the host security.
Keywords/Search Tags:Host Security, Test Technology, Port Scan, Registry Permission, Vulnerability Database
PDF Full Text Request
Related items