Dissertation > Excellent graduate degree dissertation topics show

The Research and Realization of the Army Network Security Loophole Examinable System

Author: MaChuang
Tutor: WangShengShengï¼›SunShuYang
School: Jilin University
Course: Software Engineering
Keywords: Web Security Web attacks Web vulnerabilities Web vulnerability detection
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 145
Quote: 2
Read: Download Dissertation

Abstract


In 1996, a the ordinary U.S. Navy captains, using only a laptop computer and a network cable, it easily in the face of numerous U.S. military officials made the command of the U.S. Navy's Pacific Fleet, the presentation greatly shocked the Pentagon in countries within the armed forces triggered an earthquake. Since then, the military network security has become the focus of world military construction. Today, the world's military has entered the era of information warfare, network characteristics by virtue of its high efficiency and fast became the primary means of modernization of the military command and communications, followed by protection of military network security has also become urgent problems of the national armed forces. The establishment of a fully secure military network system vulnerability is the best way to deal with the attack, but in practical terms, this is impossible. Although in recent years, Web security technology and Web security products has made great strides in technology and products have matured. For example, the military network hardware firewall under use. However, due to these security products in terms of function or performance has its limitations and vulnerability, they can only meet the system and network-specific security requirements. Therefore, a more practical approach is to first establish a relatively easy to implement the security system, at the same time in accordance with the security policy to establish appropriate safety auxiliary system. The purpose of the security situation of the current system, if we can, depending on the application environment, as early as possible through vulnerability detection to discover these vulnerabilities, and take appropriate measures in a timely manner to carry out remedial, can effectively prevent intrusion events. Web security vulnerability detection system is such a class system. Web security vulnerability detection is important to check the Web server information found which can be exploited security vulnerabilities. Security vulnerability detection result is actually a Web system safety performance assessment, it is pointed out which attacks are possible, so Web Security Vulnerability Detection Web security, an important part of the program, which also makes Web security vulnerability detection system become research focus in the field of information security. The paper is divided into four parts, the first part of the classification and simple introduction to some basic concepts related to Web security vulnerability detection system, and a detailed description of the main technologies involved in Web security vulnerability detection system. The second part of examples of Web vulnerability detection of attacks and Web security. The third part is the analysis of Web security vulnerability detection system function, and then establish the appropriate Web security vulnerability detection model, this part is the focus of this article. The fourth section focuses on major technical problems related to the implementation of Web security vulnerability detection system, and used for the preparation of the system interface functions will be described in detail, and in the last experiment to prove the feasibility of the detection system of the Web security vulnerabilities.

Related Dissertations

  1. The Technology of Browser Security Access and Fingerprint Identification,TP393.092
  2. Study on key technology of the Web content management system,TP311.52
  3. Design and Implementation of WEB Security Testing Tool Based on the AHP Algorithm,TP311.52
  4. TrojanAntier: A Statistical Analysis Based Web Trojan Defense System,TP393.08
  5. Research and Implementation of the Web Vulnerability Detection System for Web Security,TP393.08
  6. Web Security Based on Search Algorithm,TP393.08
  7. Design for Student Safety Attendance Signature System Based on Radio Frequency Identification (RFID) Technology,TP391.44
  8. Research of Web Security and Intrusion Detection Technology,TP393.08
  9. Web Security Testing Research and Design,TP393.08
  10. Extraction of attack behavior characteristics based WebDecoy,TP393.08
  11. The Research and Implement of Web Application Security Protection System Based on AOP,TP393.08
  12. The Web Attack Trapping System Based on Honeyd,TP393.08
  13. Research and Application of Web Security Vulnerability Detection System Base-on Grails,TP393.08
  14. Research and Design of Queuing Strategy and Heartbeat Mechanism for Management Platform in Web Security Detection System,TP393.08
  15. Gray Box Code Audit in Web Safety Inspection Application Research and Implementation,TP393.08
  16. Study of Machine Learning Application on Web-Based Network Security,TP393.08
  17. Development and Research (C language ) network test system based on the WEB,TP311.52
  18. Network Attack and Defense on AJAX Framework,TP393.08
  19. Service Web application security solutions,TP393.08
  20. The Research of Worm Detection Technique,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile