Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of Security Network Vulnerability Scanner System

Author: LuoYuBin
Tutor: YaoDanLin
School: National University of Defense Science and Technology
Course: Computer technology
Keywords: Network Security Loophole Vulnerability scanning Vulnerability detection and repair
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 395
Quote: 5
Read: Download Dissertation


Vulnerability refers to computer systems , hardware , software and protocol specific or safety defects exist on the system security policy , so the attacker may be illegal intrusion system or unauthorized access to , or destruction of the system . According to the Computer Emergency Response Team (CERT) report , 99% of network intrusion security events around the world report are based on known vulnerabilities occur , detect and repair system known security vulnerabilities very important to ensure network security significance , but due to various reasons (such as not familiar ) is often difficult to timely and fully test the security of the system . This paper first gives the definition of vulnerability , analysis of causes , characteristics, properties, and probing methods , and discusses the relationship between vulnerability scan . Subsequent analysis of network vulnerability scanning technology used to key technologies , such as port scanning , remote operating system identification , vulnerability scanning and plug-in technology , and knowledge of network programming . Network vulnerability scanning also works more effectively use were introduced . Based on the above basic technology , the article goes on to describe this paper the design and implementation of network security vulnerability scanning system . The system is oriented network vulnerability scanning system , able to collect the remote host and network vulnerability information after the completion of the scanning of the target host , gives a detailed scan report and specific solutions to network security management personnel to maintain the network has brought a lot of convenience . This paper analyzes the features and components of the system , described by some of the key features of the implementation details of the system implementation techniques , and emphatically describes the validation of improved OVAL vulnerability detection techniques , based on the CVE database design , simulate hacker attacks program of technology as well as bug fixes .

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Region-based wireless sensor network key management scheme for research,TP212.9
  4. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  5. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  6. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  7. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  8. The Research of Security Issues in Cognitive Radio Networks,TN915.08
  9. On Instructive Cases and Complements of the Legal Loopholes,D90
  10. Network security assessment model of rough set - based,TP393.08
  11. The Researches and Applications of Intelligent System (China Unicom) Based on NGN Technology,TM76
  12. Application of Data Mining in Intrusion Detection System,TP393.08
  13. The Reasearch and Application of Real-time Random SQL Injection Detection Methods,TP393.08
  14. Security Solution Scheme and Design of E-government System,TP393.08
  15. Research into Intrusion Detection Approach to System Implementation Based on Neural Network,TP393.08
  16. Research and Application of Early Warning System for Network Attacks Based on Honeypot Technology,TP393.08
  17. Research on Scanning Task Scheduling in Distributed Network Security Vulnerability Scanning System,TP393.08
  18. Classified information network vulnerability real-time detection technology research,TP393.08
  19. Zhengzhou, China Unicom office automation network security protection Strategy,TP393.08
  20. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  21. Design and Implementation of Network Secure Infrastructure in National Audit System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile