| In order to effectively assess the security of computer networks and thereby enable the network administrators to detect the vulnerablity and take repair as early as possible,the key technologies,such as the FCM-based network security assessment model,the romote host vulnerability detecition based on NASL,the survival of probing the network hosts based on ARP are studied,and on this basis ,disign and implement a "FoundLight network security assessment system".Using the hierarchical structure to disign,FCM-based network security,selects evaluation factors comprehensively from management security(including vulnerability scanning),physical security,data authenticity,confidentiality,integrity,authentication mechanisms and implementation, access control,auditing,and other security aspects.Then,standards of safety assessment are estabished according to security level,evaluation facotrs and application needs.And determing the measure in three ways:interviews,inspections and tests.Finally,the combination of qualitative and quantitative assessmet algorithm is used to evaluate the security of the target. The remote host vulnerability detector based on NASL simulates the direct attack way of hacker,according to the characteristics of known vulnerabilities,use the plug-in technology to construct and send custom data packets using for vulnerability.And then,according to the configuration information of the control side and loads related plug-in in loading strategy,and esplain implementation.Finally,it determines the existence vulnerability according to return information of the plug.There must be a physical address when ARP request accures.According to this principle, ARP-based network host surivival detector is designed and implemented. System testing and user evaluation results show that FoundLight network system if stable,reliable, practical,and it provids a new program for computer networks and information security.,... |