Font Size: a A A

The Research And Application Of Network Vulnerability Scanner

Posted on:2013-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2248330371483104Subject:Software engineering
Abstract/Summary:PDF Full Text Request
From the last century, with the Internet and the rapid development of computertechnology, network has in people’s lives occupies an increasingly important position, andin many areas such as aerospace, scientific research, agriculture, etc, also more and moredependent on network technology, and now is a "Internet age." In today’s society, anyonecan through the network to find what they want, also can take by the master of informationto share with others on the network. So the network information resources sharing is theability that the Internet is widely applied and obtained fast development. Along with thedevelopment of computer and network technology, the Internet more and more affectingour production and life.As the Internet and the rapid development of computer technology, and the wideapplication in production and life, some network security has slowly revealed, enabling thenetwork security became the Internet technology a key and difficult problem. The newnetwork technology to bring us facilities, but also give some illegal elements to make use of,they use the network to the implementation of the new type of crime, which requires us tonetwork security management personnel to use new technology to stop illegal networkintrusion.At present, many researchers have committed to prevent network intrusion research.Theoretically, if network system didn’t see any security hole without defect, is impossibleto somebody invades network system. However, this is ideal, in actual life could not havehad a network system without any security vulnerabilities and defects as possible, can bereduced, and the timely find security vulnerabilities to reduce the network vulnerability torepair the chance was invaded. In practical applications often use this system vulnerabilityscanner to accomplish these tasks, it is an easy realize security network system, and with asecurity auxiliary system, this safety auxiliary system according to certain security strategyis built.Normally, any network systems are flaws, enabling the network has certain securityhidden danger of network system, so need to scan the timely discovery these security vulnerabilities, timely take measures to loophole repair, can effectively prevent networkintrusion incident, make use of the network people get better protection.And network vulnerability scanning of network security vulnerabilities, vulnerabilityscanning system for a network security vulnerabilities, and gives the specific design of thesystem.The main research contents of this paper are as follows:(1) introduces network system security breach causes, characteristics, etc, andintroduces the network vulnerabilities test methods.(2) a deep research network system security vulnerabilities key technologies, such asport scanning technique and so on.(3) to CVE standard vulnerability database are studied, and through experiment for itsrealization.(4) put forward a kind of prevent network intrusion of network security vulnerabilityscanning system and realized.
Keywords/Search Tags:Network security, vulnerabilities, scanning loopholes, iw, cyber attacks
PDF Full Text Request
Related items