Design and Implementation of Computer Network Vulnerability Assessment System
- DOI
- 10.2991/iwmecs-18.2018.37How to use a DOI?
- Keywords
- Network security; vulnerability assessment; vulnerability scanning; crystal reports; XML
- Abstract
In the field of computer security, especially in the field of network security, it is very important to assess the vulnerability of computer system. Connection on the network computer system in the presence of vulnerabilities may let elsewhere on the network malicious attackers invade inside the computer system, which led to the damage of the computer system of data integrity, availability and confidentiality. The ultimate goal of network vulnerability assessment is to guide the system administrator to find a balance between "security costs" and "intrusion possibilities". The vulnerability assessment method has experienced from the manual assessment to the automatic evaluation stage, and is now being evaluated by the local assessment to the overall development, from the rule based assessment method to the model based assessment method development. However, it can be applied to the product in the process of the evaluation method based on the rules. This kind of product is commonly called the vulnerability scanning product or the security hidden trouble scanning product. The system uses the client / server structure. Server is running on the Linux platform, achieve the goal of preserving scanning plug-in, save the default configuration parameters, loading scanning plug-in on the target system of security scanning, to client sends scan status and results, recording operation log function. The direct operation of the server is carried out by means of a special Shell which is limited to the minimum function. Run the client on the windows platform and is responsible for the management, control server to perform vulnerability scanning tasks, scanning to achieve the task management, scanning strategy management, state / news shows, scanning result report generation and output, user classification and management functions.
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Mian Wang AU - Zhiqin Fan PY - 2018/04 DA - 2018/04 TI - Design and Implementation of Computer Network Vulnerability Assessment System BT - Proceedings of the 2018 3rd International Workshop on Materials Engineering and Computer Sciences (IWMECS 2018) PB - Atlantis Press SP - 167 EP - 170 SN - 2352-538X UR - https://doi.org/10.2991/iwmecs-18.2018.37 DO - 10.2991/iwmecs-18.2018.37 ID - Wang2018/04 ER -