Font Size: a A A

Research On Key Technologies Of Distributed Hidden Network Scanning

Posted on:2017-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y X ZhangFull Text:PDF
GTID:2348330518970787Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
People now pay more and more attention about the network security in their daily lives,the appearance of network security scan will help us to manage the network more actively.Discover and mend the loopholes in the network in time. Because a good network security scanning system needs to improve the accuracy of the scan results, it is necessary to prevent the scan process from being found or as the low efficiency of the implementation, the scan results accuracy rate decreased.In this paper, we can improve the efficiency of the task scheduling of the distributed hidden network scanning system, and achieve the goal of improving the accuracy of the scanning results.In view of the hidden problem in task scheduling of the distributed hidden network scanning system, this paper proposes a new distributed hidden scheduling algorithm called pick-kx algorithm, which bases on the historical records sets. Based on the historical records sets, the algorithm combines the scan detection technology with the improved pick-kx algorithm, in the actual load of the pick-kx algorithm, the hidden load calculated by the historical record set is added. As a result, distributed secret network scanning system reflects a certain effect in the stage of the task scheduling can be hidden better, then can improve the accuracy of scan results.In view of the efficiency of the network port scanning method in the distributed hidden network scanning system, this paper proposes a new method based on the threshold value of subsection IPID network port scanning. The method is based on the existing IPID hidden port scanning method, and the direct two points IPID hidden port scanning method which can batch determine a certain range of ports are closed. Because the IPID hidden port scanning method for direct two points cannot predict the opening and closing of a certain range, if a range of development of port is too large ,and blindly use two IPID algorithm direct effects the declining efficiency. Using static and dynamic prediction of the open condition of a certain range of ports to improve the direct two points of the IPID hidden port scanning method, the implementation efficiency of the port scanning method is improved, and the accuracy of the scanning result can be improved.
Keywords/Search Tags:distributed, occult, task scheduling, network port scanning
PDF Full Text Request
Related items