期刊文献+

在线安全评估系统设计 被引量:2

Design of Online Network Security Assessing System
在线阅读 下载PDF
导出
摘要 本文围绕网络主机漏洞扫描系统的设计和实现展开讨论。通过对黑客行为和典型攻击的分析,阐明了网络安全漏洞存在的必然原因,综述了计算机网络安全的现状。研究了漏洞扫描技术的具体概念,分类和局限性,阐明采用漏洞扫描技术的必要性。本文的重心在主机漏洞扫描系统的设计和实现上,包括系统结构的设计和实现,外部扫描模块和内部扫描模块的设计实现,以及漏洞库和规则库的的设计。最后提出了该系统还存在的不足以及需要进一步完善和扩展的设想。 This paper mainly discusses the design and development of a scanning s ystem for checking vulnerabilities on a Host computer that provides services via Internet. With the analysis of hackers' behaviors and typical attacks, generali zes the inevitability of the existence of security vulnerabilities and summarize s the general condition about network security. Then this paper describes the co ncept, category and limitation of the technique of scanning vulnerability, and a nalyzes the significance and inevitability of adopting this technique. This pape r puts the stress on how the scanning system was designed and implemented, inclu ding the design of the system structure, the design and development of internal and external scanning module, and the design of the vulnerability database and r ules database. At last, this paper presents some shortages of this system and pr oposes some advice to extend and perfect the system. 
出处 《计算技术与自动化》 2003年第3期106-109,共4页 Computing Technology and Automation
基金 河南省科技攻关项目。编号:0111061200。
关键词 计算机网络 网络安全 在线安全评估系统 设计 漏洞扫描技术 Network Security Scan Vulnerability Hacker
  • 相关文献

参考文献11

  • 1李晓辉 张西红 谢辉.战术网络端口扫描与漏洞的研究及实现[A]..武汉:中国计算机学会第12届网络与数据通信学术会议[C].,2002..
  • 2阎慧 曹元大 杨帆.网络安全扫描系统的关键技术与实现[A]..武汉:中国计算机学会第12届网络与数据通信学术会议[C].,2002..
  • 3李晓辉 张西红 谢辉.战术网络端口扫描与嗣洞的研究及实现[C]..武汉:中国计算机学会第12届网络与数据通信学术会议[C].,2002..
  • 4Mahesh V. Tripunitara, Partha Dutta, Gelae Spafford. Security Assessment of IP- based Networks: A Holistie Approach[R].CERIAS TR - 99/02, Purdue University.
  • 5Common Vulnerabillties and Exposures[EB/OL]. http://www.cve. mitre, org.
  • 6ICAT Metabase[EB/OL]. http://icat.niat. gov.
  • 7J.Cheng, J.Xu, "XML and DB2"[C] . ICDE Conf. San Diego,March 2000.
  • 8Steve Miksell, Security Vulnerability Assessmsmt Tools For Internet Applications White Paper[R]. ITSC, University of Maryland, arch 2001.
  • 9M. Schumacher and C. Haul etc. Data Mining in Vulnerability Databases[C]. In Proceedings of 7^th Workshop Sicherheit in vernetzten Systemen. March 2000.
  • 10Pascal C. Meunier and Eugene H. Spafford. Final Report of the 2nd Workshop on Research with Securlty Vulnerability Databases[C] ,CERIAS January 1999. Purdue University.

共引文献1

同被引文献5

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部