Font Size: a A A

Research And Design Of Automatic Vulnerability Review Technology And Vulnerability Management System

Posted on:2021-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:J X YanFull Text:PDF
GTID:2428330602476682Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Computer networks have brought great convenience to people,but also made cyberspace security an increasingly serious problem.Among them,network vulnerabilities are the basis of various network attacks.The timely discovery and repair of network vulnerabilities is an extremely important task in network security management.Due to the large number and variety of vulnerabilities,efficient and rapid automated management methods are urgently needed.However,the current related research and technology can not meet the needs,such as:centralized and unified management system and management processes are not mature enough,the discovery,repair and review of vulnerabilities are basically in manual mode,which has low efficiency and high cost,etc..Therefore,this article first studies the concepts and methods of workflow technology,the characteristics of network vulnerabilities,network vulnerability review,especially the methods,algorithms and technologies involved in automatic review;second,based on a detailed analysis of actual needs,gives the design of the actual application system The core functions of the program include:workflow-based work order flow processing,active review of network vulnerability repair situations,automatic review of weak password vulnerabilities based on the identification code of indefinite length verification code and anti-neural network algorithm;finally,the actual system Carry out detailed design,implementation and testing.Test results show that the system can achieve the expected results.The main work of this article:(1)Conduct detailed demand research and analysis with telecom operators.(2)Based on user needs,research and analyze related theories,methods,algorithms,and technologies,including:workflow concepts and technologies,active and automatic review of network vulnerabilities,feature analysis of network vulnerabilities,and variable-length verification codes Identification algorithm,password guessing algorithm.(3)Apply the concept and technology of workflow to design and develop a loophole ticket processing flow.(4)Study and propose an active review plan for the fixed vulnerabilities.(5)Based on the CNN_BiLSTM_CTC algorithm and the generated confrontation network algorithm,an automatic review method for weak password vulnerabilities is proposed and implemented.(6)Integrate and apply the above results,adopt the SpringMVC framework,give a complete network vulnerability management system design plan,and implement and test it.At present,the system achieves the expected function and has good stability.
Keywords/Search Tags:Network vulnerability management, work order circulation, workflow, active review of vulnerabilities, automatic review of weak password vulnerabilities, generation of confrontation networks, variable length verification code recognition algorithm
PDF Full Text Request
Related items