Font Size: a A A

The Network Security Tests Platform System Of Attacking Test Of Designing And Realizing

Posted on:2005-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2168360152955331Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Following the swift and violent development of Internet, the question of network security is paid attention to more and more. It is an important subject in the networking to set up a safe and reliable Web site. Though technology of fire wall, the encryption, identity authentication technology are that the safe Web site builds essential technology, But it is only the passive shelter technology that they attack the network. Attacking technology of examining to the networking products is a kind of effectual network safe protection technology on one's own initiative. This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question. From invading the angle attacked, has studied hacker's technology of attacking, the technology attacked to common invasion is analysed. Then, because of windows operating system, have designed and realized that the network security tests the platform system.Concrete and the following:Adopts the new network safe practice , structures the attack based on network and test the systematic model of the platform. This model have log-in module, deliver , rule describe module, report deal with and feedback the module and export the engine module daily record module machine who explains grammar language engine. Have guaranteed that it is an attack with intact function that tests the system. This system can be carry on denial of service to attacked and tested, overflowed to attack testing, FTP, HttP, PoP3D,etc. to attack testing, and the portof UDP, TCP scan etc.Has adopted regular engine technology of attacking, invade characteristic mode and describe languages and corresponding regular machine that explains grammar after defining one set. Use the modes that are defined to describe that the language describes this kind of attack mode characteristic of testing the type, Join and get and attack and test it in the mode storehouse of the characteristic, Come and control and attack engine and come structure test by new attack according to attack mode who characteristic describe in the storehouse through corresponding regular machine who explains grammars.To the flow, progress, Data-sending , Issue bag quantity and finish state go on and control and write down and count in real time, to attacking test result go on daily record punish. Facilitate write down to analyse of future.
Keywords/Search Tags:Network security, the loophole of network security, attack, The hacker attacks and tests
PDF Full Text Request
Related items