Font Size: a A A

Design And Implementation Of A Web-oriented Distributed Vulnerability Scanner

Posted on:2020-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q YangFull Text:PDF
GTID:2393330578968536Subject:Agriculture
Abstract/Summary:PDF Full Text Request
In recent years,computer technology has developed rapidly,and various types of Web applications and products have also entered the agricultural field.Various agricultural companies have informatized.They deployed specialized computer network systems in the company,and applied them to agricultural production,transportation,and sales.This has led to many web applications accessing the agricultural company's internal computer systems and involving private and highly sensitive information.However,the presence of agricultural companies on the vulnerability exposure platform proves that this information has not been effectively protected.In addition,the development and application of various new technologies has also added new threats to agricultural companies' Web networks.Protecting the network security of agricultural companies' Web networks has become a top priority.At present,most of the scanners for Web vulnerabilities are based on the C/S architecture.The deployment of this scanners is not easy.It is difficult while using,and the scanning of new vulnerabilities is not well integrated.Limited by the performance of the deployed host,the scanner takes a long time to scan each time.Aiming at the low scanning efficiency,poor flexibility and long scanning time of traditional scanners,this paper designs a Web-based distributed scalable scanner.Extend traditional stand-alone scanning tools into a distributed architecture that extends computer resources,optimizes scanning logic,and improves scanning efficiency.The main work of this paper is as follows:(1)This paper conducts targeted research on common web vulnerabilities in the network to determine the causes,detection methods and defense methods of various web vulnerabilities such as CMS vulnerabilities,system vulnerabilities and information leakage risks,so that the scanner can perform real network vulnerabilities Scanning work.(2)This paper Researches the vulnerability scanning technology and website information collection method,and integrates the data generated by different scanning processes in the whole scanner,and mutually verifies each other,which improves the scanning efficiency of the scanner and the accuracy of the vulnerability scanning.Based on the previous research,according to the characteristics of the distributed vulnerability scanner,combined with multi-process and coroutine technology,the working node is further subdivided from the host to the worker level,and the message-based queue is adopted on the resource monitoring module of the central node.The resource monitoring method improves the resource utilization of the distributed system.The scanner's storage system is divided into two kinds of database and three storage points,which makes the scanner data transmission more clear and concise.(3)This designs and implements the overall architecture of the Web-oriented distributed scanner and the functions of each module.This paper designs and implements various functions in the central node and task node;builds a test environment,builds a test data set,tested,compares and analyzes the function and performance of the scanner,and verifies the functions of the scanner.
Keywords/Search Tags:Web vulnerability scanning, distributed technology, Web vulnerability
PDF Full Text Request
Related items