Font Size: a A A

Management And Reaserch Of Network Vulnerabilities Scaner Nessus

Posted on:2009-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:B WangFull Text:PDF
GTID:2178360272985985Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, Internet has became anintegral part of daily life. However, along with Internet's widespread popularization,Internet security has become people's focus of attention. Network administrator oruser need to use Security Risk Assessment to protect Internet security.Firstly, this article discussed the meaning of vulnerability, the meaning of crackscanner, origin and harm rank of vulnerability. Network vulnerability scanner is aprogram that automatically monitors weak points of local remote server by collectingsystem information.The system administrator can discover potential hazard thatexisting in the server or the main engine through the scanner. The system consists ofscanning servers,Web management centre, and background database,etc.Then the article analyzed principle of Nessus and deficiencies of traditionalnetwork scanning system, designed a distributed network vulnerability scanningsystem based on multiple Nessus scanning servers throughWeb management centre.The article designed an independent database for the scanning system. The systemrealized the scanning duty balanced distribution and the automatic queue. The systemcan realize the management of scanning users'right and Monitor the real-time statusof scanning server.This system can scan the object host in fixed time and send theresults to the administrator automatically. The system can judge the condition of targethost through analysis.It also can present the safe status with curve graph or piegraph.The scan system can provide safe status analysis and loophole solution to users.Finaly, this article drew up a detailed test, tested the system and analyzed thetesting result. The results show that the system ran in good condition and fully metdesign requirements.
Keywords/Search Tags:Network Vulnerability Scan, Nessus, Distributed, Network Vulnerability
PDF Full Text Request
Related items