Font Size: a A A

A Load-balanced Network Vulnerability Management System

Posted on:2009-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:W W YangFull Text:PDF
GTID:2208360245479057Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularity of computer networks and application of distributed computing, Ensure network security becomes more and more important. Research shows, Over 70 percent of the network are very fragile, Network vulnerability management system Scanning the various vulnerabilities of the host in the Specific Range, analysis and processing. As the number of nodes in the network structure is not balance, Leading to vulnerability scanning tasks are completed relatively low efficiency. In this paper, the main task is to solve the problem about dynamic allocation of the scanning task, Design and Implementation of vulnerabilities scannerIn this paper, we design a network vulnerability management system, system is Composed of a Central controller and Many scanning servers, Central controller distributes the tasks to scanning servers, scanning servers scan hosts in a particular area and Return results For further analysis. Since the number of the host which are managed by every scanning servers is different, Lead to load is unbalanced. The final task is completed depends on the scanning time with the longest mission. In order to improve the overall efficiency of the scanning. In this paper, a load-balancing technology is used. Through a Improvement for Centralized dispatching mechanism to achieve better load balancing effect. Centralized Scheduling is Performed by Central controller, It did not consider the current state of the scanning server, Improved methods is to add a dynamic load balancing module in the scanning server, when the arrival of each new tasks, According to its own load, decided to transfer or receive new tasks. In this way dynamic adjust the distribution of tasks.This paper also has conducted in-depth study vulnerability scanning technology. In the system, Use scan mode of Web-based, Scanning server get port information through the port scanning, And call for the corresponding plug-in to do the vulnerability scanning.Finally, I establish two experimental models and test the whole system, Verify that the whole system in the scanning speed has been enhanced by improving the distribution of tasks and scheduling mechanism...
Keywords/Search Tags:network security, security scanning, load balancing, distributed system
PDF Full Text Request
Related items