Design and Implementation of Vulnerability Scanning Distributed System

被引:0
作者
Ping, Zhang [1 ]
Bin, Tao [1 ]
机构
[1] Coll Henan Engn, Zhengzhou, Peoples R China
来源
THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010) | 2010年
关键词
Vulnerability Scanning; Plug-in technology; Agent Technology; Distributed System;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we discussed the basic principle and the common shortcoming in the existing network vulnerability scanning systems. Based on these, distributed system based components of network vulnerability scanning system and the communication and collaboration of Agents are been described in detail. The system uses plug-in technology to strengthen the expansibility. Its key factors are friendly interface, faster scanning, and particularly scanning results in detail.
引用
收藏
页码:361 / 364
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 2002, MAXIMUM SECURITY
[2]  
Cao Yuanda, 2005, MICROCOMPUTER DEV, V15, P72
[3]  
Chen Tieming, 2004, COMPUTER ENG DESIGN, P194
[4]  
Guo Fanglu, 2005, AUTOMATED SAFE VULNE
[5]  
Liu Bo, 2005, COMPUTER ENG SCI, V26, P31
[6]  
Ma Hengtai, 2000, J SOFTWARE, V11, p[131, 221, 319]
[7]  
Storms Andrew, 2004, USING VULNERABILITY
[8]  
Yoshimoto Michitaka, 2005, DEV SECURITY CANNER
[9]  
Zhang Yuqing, 2004, SECURITY SCANNING TE, P10