Proceedings of the 2018 3rd International Workshop on Materials Engineering and Computer Sciences (IWMECS 2018)

Design and Implementation of Computer Network Vulnerability Assessment System

Authors
Mian Wang, Zhiqin Fan
Corresponding Author
Mian Wang
Available Online April 2018.
DOI
10.2991/iwmecs-18.2018.37How to use a DOI?
Keywords
Network security; vulnerability assessment; vulnerability scanning; crystal reports; XML
Abstract

In the field of computer security, especially in the field of network security, it is very important to assess the vulnerability of computer system. Connection on the network computer system in the presence of vulnerabilities may let elsewhere on the network malicious attackers invade inside the computer system, which led to the damage of the computer system of data integrity, availability and confidentiality. The ultimate goal of network vulnerability assessment is to guide the system administrator to find a balance between "security costs" and "intrusion possibilities". The vulnerability assessment method has experienced from the manual assessment to the automatic evaluation stage, and is now being evaluated by the local assessment to the overall development, from the rule based assessment method to the model based assessment method development. However, it can be applied to the product in the process of the evaluation method based on the rules. This kind of product is commonly called the vulnerability scanning product or the security hidden trouble scanning product. The system uses the client / server structure. Server is running on the Linux platform, achieve the goal of preserving scanning plug-in, save the default configuration parameters, loading scanning plug-in on the target system of security scanning, to client sends scan status and results, recording operation log function. The direct operation of the server is carried out by means of a special Shell which is limited to the minimum function. Run the client on the windows platform and is responsible for the management, control server to perform vulnerability scanning tasks, scanning to achieve the task management, scanning strategy management, state / news shows, scanning result report generation and output, user classification and management functions.

Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2018 3rd International Workshop on Materials Engineering and Computer Sciences (IWMECS 2018)
Series
Advances in Computer Science Research
Publication Date
April 2018
ISBN
978-94-6252-491-0
ISSN
2352-538X
DOI
10.2991/iwmecs-18.2018.37How to use a DOI?
Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Mian Wang
AU  - Zhiqin Fan
PY  - 2018/04
DA  - 2018/04
TI  - Design and Implementation of Computer Network Vulnerability Assessment System
BT  - Proceedings of the 2018 3rd International Workshop on Materials Engineering and Computer Sciences (IWMECS 2018)
PB  - Atlantis Press
SP  - 167
EP  - 170
SN  - 2352-538X
UR  - https://doi.org/10.2991/iwmecs-18.2018.37
DO  - 10.2991/iwmecs-18.2018.37
ID  - Wang2018/04
ER  -