Font Size: a A A

Network Security Risk Scanning System Research And Design

Posted on:2012-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y X JiangFull Text:PDF
GTID:2218330338969964Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of Internet technology, network deeply and widely, meanwhile, the problem of network security is hardly. Therefore, how to effectively that the computer system security risks exist and better protect the network information resources, becomes very important. Security risks can be detected by security risks scanning technology so that network Manager can know the network security to protect the internet. This thesis discussed security risks scanning technology, analyzed using scanning technology network hidden danger of key techniques. In the end, using Visual C# and Visual the C++ language develops and designs one to be able to realize the multi-main engines, the multi-projects as well as the multi-thread network security hidden danger sweeping system. Detailed work shows in the following aspects:1. On the basis of discussing the definition, cause, loopholes and testing etc, the general principle of network attacking is deeply analyzed and solutions and strategies of the scanning process is summarized in this thesis.2. Through introduction basic concept of vulnerability scan, key technologies detail of security scanning technique was studied, including port scanning, remote system identification, crack scanning aspect, NASL script analysis contents and so on . Security vulnerabilities scanning system model was proposed, which may realize the multi-main engines, the multi-projects and the multi-thread network crack.3. In the research security crack scanning technique's foundation, such as system construction, functional module and procedure flow designs of network security hidden danger scanning system is discussed. Realizable plan was drew up concretely, and based on the plug-in unit technology; network security crack scanning system was designed.4. Divides in the hypothesized Ubuntu10.4 operating system and Windows on the XP operating system, the small local area network and the Internet three kind of situations, this network security hidden danger scanning department's test was completed. Through the analysis test's result, this design system's feasibility was confirmed.
Keywords/Search Tags:Network Security, Intrusion Detection Technology, Vulnerability scan, Security Vulnerabilities
PDF Full Text Request
Related items