Font Size: a A A

Based On Network Security Vulnerability Scanning Technology And System

Posted on:2004-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y H LiuFull Text:PDF
GTID:2208360095450928Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network and communication, it's a trend to communicate with open network. But it also a risk to use the convenient resources of network.. So, the problems of network security are paid more attention to and become key points of network security. Usually hackers and computer virus intrude a computer system by security holes. So, the system can be secure by detecting the holes by network administrators. The security holes scanning technology makes the network administrators predict the places of the security holes. So it becomes an important security technology.With the imbursement of Realization of Information Security and Engineering Project, we studied the security holes scanning technology. And we designed an active security holes scanning system based on technology of network and plugins, and realized an automatic builder of scripts in order to simplify the programming with plugins. The research work mentioned in this paper is mainly about:(1) It studies the technology of security holes scanning. By the analysis of it's strategies and methods, we have known the principle of the technology.(2) It designed a security holes scanning system. It presents the design of aim, system, models, relation flows and key technologies.(3) It presents the studies of NASL, a language of scan scripts. And it realized an automatic builder of scripts based on NASL to settle the problem of programming using plugins.(4) Finally, it presents the results of test to prove the feasibility of the system.
Keywords/Search Tags:network security, security holes, interpreter, plugin, script
PDF Full Text Request
Related items