Font Size: a A A

Design And Implementation Of Network-Based Vulnerabilities Scan System

Posted on:2011-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:S F XiaoFull Text:PDF
GTID:2178360308462124Subject:Electromagnetic field and microwave technology
Abstract/Summary:PDF Full Text Request
With the development of computer network, network information security has become the key element of keeping country's security and social stability. Security scanning technology is a very effective and initiative defense one that can detect hidden insecurity and can provide a comprehensive protection for the network. So, security scanning technology has become a hotspot of study. The existence of plentiful vulnerability is a menace to the safe of network system. It has significant meaning in researching network sacnning technology. From the perspective of administrators this thesis discusses study and implementation of the network security scanning technology and the network security scanning system and describes the implementation of a prototype network vulnerability scanner.This prototype system detects the target host's vulnerabilities by simulating hacker's attacks. After scanning, it can make reports to the found vulnerability, so it brings great benefit to system administrators. The prototype system can help the administrators to know the security situation of network faster and timely. In addition,this prototype system uses plug-in technology to strengthen the expansibility, so it can support to detect the new vulnerabilities. At last the thesis analyzes the functions and component so the prototype system which is implemented in the thesis. And it presents the results of test to prove the feasibility of this prototype system.
Keywords/Search Tags:network security, vulnerability, Vulnerability scanning, detection and repair of vulnerability
PDF Full Text Request
Related items