Font Size: a A A

Design And Application Of Vulnerability Scanning System Based On Plug-in Technology

Posted on:2013-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2218330362467543Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the growing popularity of computer networks, the Internet hasbecome an inseparable part of people's lives. At the same time, due to securityvulnerabilities in network security incident after another, as the content andapplication providers of Internet companies are facing a growing number ofsecurity threats and challenges.By researching and analysising the port scanning and vulnerabilityscanning technology, and researched a variety of common vulnerabilityscanner products, combined with the Internet, enterprise businesscharacteristics, vulnerability warning, detection, repair, auditing, riskmanagement thinking into the vulnerability scanning system, the realizationof a plug-in technology-based vulnerability scanning system. The systemconsists of port scanning module, vulnerability testing plug-in database, thesystem engine, reporting module, management module, the client interfacemodule. Security personnel through the scanning system configuration scantargets and scanning strategy, the system automatically send a scan to detectand report vulnerabilities to the system administrator, system administratoraccording to the report's safety recommendations to repair flaws. Thevulnerability scanning system that can help security personnel quickly andtimely view across the enterprise information systems security, and also toreduce security risks.This vulnerability scanning system achieved through comparison withthe commercial vulnerability scanners, the vulnerability scanning systemperformances outstanding. In actual use in production systems, the companyfound a large number of systems for the vulnerability by the minimum costand bring the enterprise information security to the maximum protection,which proved in this paper the design and implementation of enterprisevulnerability scanning system on the Internet has a wide application value.
Keywords/Search Tags:Network Security, Vulnerability, Vulnerability Scanner
PDF Full Text Request
Related items