Font Size: a A A

Vulnerability Scanning Technology Research

Posted on:2007-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:C MoFull Text:PDF
GTID:2208360185473826Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Analyzing the potential risk for the network system has became more important with the growing number of back holes on the network found each year. Actively scanning the network system to detect the black hole, which include scan the local network and computers in the local network domain and notify the administrator for any potential risks in time, is very useful to identify useless services and potential security holes in the network system before it could really cause damages. This article suggests a new extension for current network security scanning method, and implements it in an experimental environment. The following are included in this paper:1. Analyzing current network securing scanning technology, and describe its strategy and methodology in deep.2. Design a network security scanning system, which includes its objective, the system architecture, functional modules, program flow, etc.3. Build an experimental platform, which running the Nessus, a black hole scanning software, on a Unix server.4. Create a new plug-in tool to extend the black hole scanning method using NASL script.
Keywords/Search Tags:Network security, vents scanning, Nessus
PDF Full Text Request
Related items