Font Size: a A A

Design And Implementation Of Network Security Report Analysis And Summarization System

Posted on:2019-02-13Degree:MasterType:Thesis
Country:ChinaCandidate:Z SunFull Text:PDF
GTID:2348330566959221Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the progress of social science and technology,all kinds of network security events emerge in endlessly,the personal,social,national caused serious threat.In the face of this situation,there have been numerous solutions according to different network security threats.Enterprise web application through a variety of detection tools in case of threat detection has become the major means of prevention,recognized by the industry,can greatly reduce for enterprise,national security threats.However,on the same site application,the vulnerability scanning equipment from multiple security will be issued by points vulnerability scanning report,then the problem is for loopholes non-response rates rise,the integrity of single report is not high.Based on artificial analysis will report the summary although feasible,but greatly the cost of human resources,and in view of the network site application number in the status quo,manual analysis report is not realistic.Based on the requirements,design the network security system analytical summary report.This work mainly as follows:(1)Analyzing the characteristic of today's mainstream security vendors vulnerability scanning report and establish the user's specific needs.(2)Use JSoup factory security scan report of text extraction technology to achieve the extraction and the design of the template.(3)In the network security based on distance vector analytical summary report system has realized the contrast of the two reports.System design is divided into two parts,one is the system function module design and database design.Function module mainly divided into five major functional modules,specific for the report parsing,data input,text matching,template set and data output.Database design is divided into database concept structure design and physical structure design,conceptual structure design of this system are introduced data entity,physical structure design is mainly aimed at the tables in the database structure design.This system not only can sweep of different leakage report parsing,and can integrate the contrast,more perfect vulnerability scanning report presented to users,make up now on the market without a blank of the same kind of report processing software,greatly save labor costs,improve work efficiency,to provide users with more reliable,comprehensive network security advice.
Keywords/Search Tags:Internet Security, Vulnerability Scanning, DistanceVec
PDF Full Text Request
Related items