Design and implementation of network vulnerability scanner 网络漏洞扫描器的设计与实现
This is particular useful with a good tuned vulnerability scanner and ids 使用漏洞扫描器与相应的ids对应起来如果处理的好的话这种关联非常有用。
In the end, this article describes the design and implementation of a network vulnerability scanning system, which names nvs ( network vulnerability scanner ) 最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统nvs(networkvulnerabilityscanner)。
Making use of existed technology of vulnerability scanner and combined the distributed character of electronic government affair network platform, studying on the theories of security scanning products inexistence, a new type of network vulnerability scanner system model was introduced and designed . the system itself took distributed agent software as the core , with the designing in the service of different construction and quality network platform 利用现有的漏洞检测技术,结合电子政务网络平台的分布性,对安全漏洞的产生根源和漏洞扫描系统的工作原理等方面的研究做了深入的分析,揭示出目前网络安全检测产品中对计算机网络安全漏洞动态产生以及相应检测模块的发展更新的忽视,并提出了分布式的数据模型。
Making use of existed technology of vulnerability scanner and combined the distributed character of electronic government affair network platform, studying on the theories of security scanning products inexistence, a new type of network vulnerability scanner system model was introduced and designed . the system itself took distributed agent software as the core , with the designing in the service of different construction and quality network platform 利用现有的漏洞检测技术,结合电子政务网络平台的分布性,对安全漏洞的产生根源和漏洞扫描系统的工作原理等方面的研究做了深入的分析,揭示出目前网络安全检测产品中对计算机网络安全漏洞动态产生以及相应检测模块的发展更新的忽视,并提出了分布式的数据模型。
In this paper , under the background of " digit fujian " electronic government affair network platform the means used by hackers to intrude computer network systems have been thoroughly discussed and analysed . and the primary causation of intruding into a network-the security leaks of a system was pointed the architecture of distributed vulnerability scanner is introduced 本文在“数字福建”电子政务网络平台的背景下,系统地讨论了现有计算机网络安全隐患,分析了黑客可能入侵电子政务平台网络的常用手段,指出网络被入侵的根本原因在于系统安全漏洞的存在。并介绍漏洞扫描系统的工作原理及研究现况,指出传统漏洞扫描系统的不足,提出基于分布式漏洞扫描系统的模型。