Font Size: a A A

Design And Implementation Of Distributed Vulnerability Scanning Management System Based On Cloud Computing

Posted on:2015-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y X HongFull Text:PDF
GTID:2298330467463482Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, it is facing an increasingly serious problem of the cybersecurity and cybercriminals. Statistical data indicated that most network security issues arise from the vulnerabilities of operating system, software or web application. Attacking throw vulnerabilities or software defect has been one of the most important method of hackers. Therefore, if enterprise or individual can scan for the probable security vulnerabilities of the system in advance, the success rate of attacking will be fully reduced, carrying points of security defending. Now there are many convenient and functional software or system of vulnerability scanning at home and abroad, however, with the com-ing of Big Data, Many server resources and data of enterprises have become an explosive growth, and the traditional vulnerability scanning system has been powerless facing more and more large-scale scanning tasks. At the same time, the development of cloud computing and distributed technology brings new idea for vulnerability scanning. In the environment of cloud computing, By adding more scanning resources for vulnerability scanning system, we can sat-isfy the needs of large-scale tasks for vulnerability scanning system. So how to combine cloud technology and vulnerability scanning, how to deal with the distributed management of scanning resource and how to schedule the tasks in load balance, has been the key problems of disposing vulnerability scanning issues with distributed technology.Using cloud computing and distributed technology, the paper designs a set of distributed vulnerability scanning management system, which can de-ploy in laaS and take fully advantage of scanning resources offered by cloud. It is suited to the characteristic of big consumption of network resource, the high demandingness of on-line real-time and the complexity of management, meeting the demands of large-scale tasks of vulnerability scanning. To increase the resource utilization rate, speed up scanning and optimize the efficiency of tasks, it can offers distributed management of scanning resource, the load bal-ance scheduling of tasks, the storage of data and processing of failed tasks. The paper firstly talk about the current situation of internet security issues, and then give out the background and significant of the research, secondly discuss the technique of vulnerability scanning, cloud computing and distributed comput-ing, and then present an idea and solution of combining vulnerability scanning and distributed techniques, thirdly give out the requirements analysis, the ar-chitecture design and accomplishment of the system, and the testing, which proves the advantage of it comparing with other systems.
Keywords/Search Tags:Network Security, Vulnerability Scanning, Cloud Com-puting, Distributed Technology, Task Scheduling, Load Balance
PDF Full Text Request
Related items