漏洞扫描

  • 网络X-scan;Nessus;scanner;vulnerability scan;vulnerability scanner
漏洞扫描漏洞扫描
  1. 本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。

    The dissertation studied the management information modeling method based on CIM , then presented a CIM model of network vulnerability scanner .

  2. 更好的方法是使用面向软件即服务(SaaS)的漏洞扫描工具,确保漏洞评估和修复的一致性。

    A better approach is to access an Software as a Service ( SaaS ) - oriented vulnerability scanner to ensure consistency of vulnerability assessment and remediation .

  3. 一种基于渗透性测试的Web漏洞扫描系统设计与实现

    Design and Implementation Based on the Test of Permeable Web Crack Sweeping System

  4. 各个企业和行业都依靠各种流行的漏洞扫描工具(包括免费和商用的)来识别Web应用程序漏洞。

    Businesses and industries rely on popular vulnerability scanners ( free and commercial ) to identify web application vulnerabilities .

  5. Unix主机漏洞扫描系统的原理与实现

    Theory and realization of vulnerability scanning system for unix host

  6. 对漏洞扫描的关键技术进行分析研究,提出一种适合于Web应用程序漏洞的基于网络的扫描器的模型,给出一套相对完整的、可行的设计方案。

    By analyzing the key technology for vulnerability scanning , a Web-based Web application vulnerability scanning model and a set of relatively complete and feasible design proposal are proposed .

  7. 而Web应用漏洞扫描软件作为漏洞检测过程中一类重要的工具,能有效地辅助检测者的工作,减少检测者的工作量,因此很有研究的必要。

    Web application vulnerability scanning software is an important tool for the detection process , which can effectively support the work of the testers , greatly reduce the detection workload .

  8. 网络漏洞扫描系统的功能分析与CIM建模

    Function Analysis and CIM Modeling of Network Vulnerability Scanners

  9. 叙述了CGI的安全性及CGI漏洞扫描的原理。

    Security problems and scan theory of CGI are described .

  10. 目前计算机安全市场上的安全产品主要可分为反病毒、防火墙、商用密码、CA系统以及入侵检测与漏洞扫描。

    There are mainly six families in the security products market : Anti-Virus , Firewall , Crypto , Certificate Authority , Intrusion Detection and Vulnerability Assessment .

  11. 该系统采用了黑盒测试理论及模糊测试技术,在执行漏洞扫描时,目标网站的源码对用户是透明的,这样在实现完备的Web漏洞测试功能的同时也保证了Web网站的隐私保护需求。

    We employ black-box testing idea and fuzzy testing technology to scan the loopholes , besides ; the source code of target web site is absolute users-invisible to ensure the Web site privacy requirement at the same time .

  12. 重点介绍了双协议解析引擎的设计和IPv6漏洞扫描处理。

    Among them the more characteristic one is the design of the protocol analysis engine and the scan detection based on the attacks of IPv6 loopholes .

  13. 最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(NetworkVulnerabilityScanner)。

    In the end , this article describes the design and implementation of a network vulnerability scanning system , which names NVS ( Network Vulnerability Scanner ) .

  14. 在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。

    Secondly , the dissertation analyzed and induced network vulnerability scanners ' functions , and presented a CIM model of the scanner .

  15. IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。

    IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity .

  16. Nessus是当前较先进的漏洞扫描软件,它以插件的形式完成漏洞检查。

    Nessus is an advanced vulnerability scanner , which checks the vulnerability by the plugins .

  17. NVS漏洞扫描方法库的扩充是通过插件形式实现的,漏洞扫描结果对实施攻击提出有效建议。

    Scanning methods can be extended by NVS plugins . And the scanning results of NVS give suggestion for attack .

  18. 在模拟黑客攻击模型的基础上,综合采用Windows和Linux平台作为扫描基础平台,采用客户端/服务器架构,利用分布并发机制设计了一个高效网络漏洞扫描系统。

    An effective Network Security Scan system , which based on the simulation to the hacker 's attack activities , and the LINUX and WINDOWS , was deigned . It used the structure of Client / Server and the mechanism of distributed simultaneously to improve the scan speed .

  19. 本文深入的研究了漏洞扫描系统的实现原理和机制,设计了一款基于Nessus的漏洞扫描系统。

    In this paper , we study the principle of the vulnerability scanning system and realize the system based on the Nessus .

  20. 同时,在SOC平台基本功能的基础上,将IDS、漏洞扫描、防病毒系统等多套安全设备系统进行统一管理,实现多安全防护系统的偕同互补工作。

    Meanwhile on basis of SOC platform basic functions , a global administration is done on several security equipment of IDS , bug scanner scan , anti-virus system etc , in which way it realized a cooperate and complementary work with multi-security system .

  21. 介绍了网络安全的有关扫描技术,重点介绍了端口扫描技术和漏洞扫描技术及原理,分析了各类端口扫描技术和部分技术的实现以及漏洞扫描各种技术的实现。CC类;

    This paper introduces some relevant scanning techniques for network security , focusing on the port scanning technique and the vulnerability scanning technique and their principles , and analyzes on the realization of each kind of port scanning technique and vulnerability scanning technique .

  22. 使用Metasploit进行漏洞扫描超出了本文的范围,您可以阅读多种教程和书籍获得帮助(参见参考资料)。

    Although using Metasploit to perform your own vulnerability scanning is outside the scope of this article , many tutorials and books are available to help ( see Resources ) .

  23. 分析重庆移动IDC安全设计方案,包括多层、异构防火墙的布署,基于网络、主机、数据库入侵检测的布署,漏洞扫描的使用,专业防病毒扫描软件的配置;

    Analyzed the solution of security design of CQ-IDC , including the deployment of multi-layers nonhomogeneous firewall , the deployment of IDS based on the network , host , and database , the use of vulnerability scanning , and the configuration of professional anti-virus software .

  24. 系统地研究了漏洞扫描脚本语言NASL,并基于NASL语言设计和实现了脚本自动生成器,为用户提供了一个编写、更新和维护扫描脚本的环境,提高了用户的工作效率。

    It presents the studies of NASL , a language of scan scripts . And it realized an automatic builder of scripts based on NASL to settle the problem of programming using plugins .

  25. 基于电子政务网络平台的分布式漏洞扫描系统的设计

    Distributed Vulnerability Scanner Design Based on Electronic Government Affair Network Platform

  26. 基于漏洞扫描的综合扫描系统设计

    The Design of an Integrative Scan System Based on Vulnerability Scan

  27. 网络系统安全漏洞扫描浅析

    The Study of the Technique for Network Security Vulnerability Scanning

  28. 基于状态转换与漏洞扫描的入侵检测的研究

    The Intrusion Detection System Based on the State Transition with Vulnerability Scanner

  29. 局域网的计费网关与漏洞扫描结合技术

    Technology combined with local area network 's cost gateway and leak scanning

  30. 漏洞扫描的中央控管模型研究

    Research of a Center - controlled Model for Vulnerability Scanning