基于网络爬虫的网络漏洞扫描检测系统的设计与实现
发布时间:2018-06-03 11:35
本文选题:网络爬虫 + 网络漏洞扫描检测 ; 参考:《吉林大学》2014年硕士论文
【摘要】:网络漏洞扫描检测是网络安全管理的重要组成部分,是网络公司管理的重要环节,及时准确的漏洞扫描检测是网络公司安全的重要依据。随着计算机网络技术的迅速发展,很多网络公司已经拥有自己的网络漏洞扫描系统。但是绝大部分系统都掌握在大型公司里面。这些网络漏洞扫描系统软件虽然功能很强大,但是购买使用权需要昂贵的费用,大部分中小型网络公司无法承担,并且这些软件使用也很复杂,因此需要开发易于操作、价格相对便宜的网络漏洞扫描检测系统。 本文针对大多数企业对网络监控的实际工作需要,开发了网络漏洞扫描检测系统。论文主要应用JAVA语言、J2EE平台、Servlet技术、Oracle数据库和嵌入式Web服务器技术对本系统进行开发。通过这些技术的使用,使得系统的性能有了很大的提高。本系统包括请求扫描调度模块、扫描调度模块、漏洞扫描管理模块和信息搜集模块。其中请求扫描调度模块可以实现扫描任务控制、配置扫描参数、获取扫描漏洞、确定扫描任务以及输出扫描参数等5个子功能;扫描调度模块可以实现基本信息探测、扫描设置、端口扫描等3个子功能;漏洞扫描模块则可以实现FTP漏洞扫描、HTTP漏洞扫描、SQL漏洞扫描、SMTP漏洞扫描等4个子功能;信息搜集模块中可以实现扫描系统类型、扫描服务器类型、IP地址及端口号等3个子功能。 网络漏洞扫描检测系统在实际的应用测试过程中,达到了测试的要求;并且系统满足了网络公司的现有需求。网络漏洞扫描系统具有资源共享、信息快速传递、流程规范化等优良特性,在提高工作效率上起到了很大的作用。网络漏洞扫描检测系统的研发加快了企业信息化的步伐,,提高了企业信息化的管理水平,使其在激烈的社会竞争中立于不败之地。因此,建设和完善网络漏洞扫描检测系统具有非常重要的实际意义。
[Abstract]:Network vulnerability scanning detection is an important part of network security management. It is an important link of network company management. Timely and accurate detection of vulnerability scanning is an important basis for network company security. With the rapid development of computer network technology, many network companies have own network vulnerability scanning system. But most of them have their own network vulnerability scanning system. The systems are all in large companies. These network vulnerability scanning systems are powerful, but the right to buy and use is expensive, most small and medium-sized network companies are unable to undertake, and these software are also very complex, so it is necessary to develop a network vulnerability scanner that is easy to operate and is relatively cheap. Unification.
This paper develops a network vulnerability scanning and detection system for most enterprises in the actual work of network monitoring. The paper mainly uses JAVA language, J2EE platform, Servlet technology, Oracle database and embedded Web server technology to develop this system. Through the use of these technologies, the system performance has been greatly improved. The system includes the request scan scheduling module, the scanning scheduling module, the vulnerability scanning management module and the information collection module. In this system, the request scan scheduling module can achieve 5 sub functions, such as scanning task control, configuring scanning parameters, obtaining scanning vulnerabilities, determining scanning tasks and output scanning parameters, and so on. This information detection, scanning setup, port scan and other 3 sub functions; vulnerability scanning module can achieve FTP vulnerability scanning, HTTP vulnerability scanning, SQL vulnerability scanning, SMTP vulnerability scanning, and other 4 sub functions; information collection module can realize scanning system type, scanning service type, IP address and port number, and other 3 sub functions.
The network vulnerability scanning detection system has achieved the requirements of the test in the actual application test process, and the system meets the existing requirements of the network company. The network vulnerability scanning system has the excellent characteristics such as resource sharing, rapid transmission of information, process normalization and so on, which has played a great role in improving work efficiency. Network vulnerability scanning is very important. The research and development of the tracing system has accelerated the pace of enterprise informatization, improved the management level of enterprise information, and made it invincible in the fierce social competition. Therefore, it is of great practical significance to build and improve the network vulnerability scanning and detection system.
【学位授予单位】:吉林大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08;TP311.52
【参考文献】
相关期刊论文 前2条
1 李盛韬;余智华;程学旗;白硕;;Web信息采集研究进展[J];计算机科学;2003年02期
2 龚平;;用JSP/Servlet实现文件上传[J];梧州学院学报;2007年03期
本文编号:1972641
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1972641.html