Font Size: a A A

Research And Implementation Of Search Engine For Cyberspace Security

Posted on:2021-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:T D L DanFull Text:PDF
GTID:2518306050968449Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
In recent years,due to the high penetration of the Internet,there are more and more types of devices connected to the Internet.In addition to personal computers and servers,there are routers,Io T appliances,tablets,and mobile phones,and even more sensitive network equipment such as monitoring probes and SCADA systems in industrial control,which together form the cyber space where we are(Cyberspace).The cyberspace is composed of these network devices,if any one of the network devices fails,it will likely cause security problems in the entire cyberspace.Therefore,how to understand the information about network equipment in cyberspace is imminent,and as people increasingly demand the use of search engines,how to quickly and accurately obtain information about network equipment in cyberspace becomes very important.Therefore,A search engine for cyberspace security came into being.The secure search engine for cyberspace implemented in this paper mainly completes the collection of network device data in cyberspace,and the task of scanning and identification is obtained by listening to the message queue.The main collected data includes IP,port number,opening and closing information,operating system and its version.Number,service and its version number,component and its version number,Banner data,etc.,then process this data and put it in the message queue,and then the Mongo DB database reads the data by listening to this message queue and stores it in the database For server invocation and search engine indexing,so that users can use the functions provided by the system through front-end pages.The system mainly uses the network scanning tools Nmap,Zmap and third-party tools ipstack to complete the collection of network device data.First,this article introduces the research background and significance of search engines for cyberspace security,analyzes the research status at home and abroad,and then gives the main research content of the paper.Then,I made in-depth research on related theories and technologies,mainly studying the components of search engines,common scanning technologies and common scanning tools.Secondly,the requirements analysis and overall design of the search engine oriented to cyberspace security were carried out,and the overall framework diagram of the system was given.Based on this,the framework flowchart of the system was designed,and the framework flowchart of the system was referred to Divide the modules of the system.Then,each module of the system is designed and implemented in detail.In addition,the system was tested for functionality through the UI implementation process and performance tests were performed to verify that the search engine for cyberspace security meets design principles and requirements.Finally,this article summarizes the work and shortcomings of cyberspace-oriented secure search engines,and points out future work directions.
Keywords/Search Tags:cyberspace, network equipment, network scanning, cyberspace security, search engine
PDF Full Text Request
Related items