Font Size: a A A

Design And Implementation Of Network Routing Device Vulnerability Analysis Test Platform

Posted on:2017-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:R Q ZhangFull Text:PDF
GTID:2358330512969079Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, more and more attacks on the network routing devices, the security of the routing equipment has gradually been valued by the major manufacturers. In order to improve the ability of security practitioners to analyze and test vulnerabilities and protect enterprises and home routers from attack, this paper studies the working principle, routing protocols and vulnerabilities of routing devices, and designs a routing device test platform.This paper mainly completes the following three aspects:Based on the research of network defense technology and analysis of network attacks, the design of routing equipment test platform is proposed, and the analysis and testing of four vulnerabilities are proposed. A good test platform has a stable test environment, and easy to monitor and maintain, to achieve the analysis and test platform to build the need to have a deep understanding of the principle of vulnerability. Therefore, this paper analyzes some commonly used loopholes in the first.Secondly, the design and implementation of the virtual equipment involved in the system, the virtual equipment and real devices are combined, based on security technology reference equipment, using existing open source software and technology to achieve the analysis module and test module platform.Finally in the design of the test platform has been announced by the use of four vulnerabilities platform test.Through the platform test to achieve the desired objectives, in accordance with the results of vulnerability analysis. At the same time, the vulnerability types are summarized and guard, which provides a direction for the future research of equipment safety, and becomes a useful practice for the transition from research to application.
Keywords/Search Tags:Equipment security, Intrusion detection, Firmware analysis, Vulnerability mining
PDF Full Text Request
Related items