广东工业大学学报 ›› 2011, Vol. 28 ›› Issue (1): 8-11.

• 综合研究 • 上一篇    下一篇

插件技术在漏洞分类扫描中的应用

  

  1. 广东工业大学 计算机学院,广东 广州  510006
  • 出版日期:2011-12-25 发布日期:2011-12-25
  • 作者简介:谢惠琼(1986-),男,硕士研究生,主要研究方向为网络安全技术.
  • 基金资助:

    广东省自然科学基金资助项目(9151009001000043);广东省科技计划项目(2009B060700002)

The Application of Plugin in Vulnerability Category Scanning

  1. Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China
  • Online:2011-12-25 Published:2011-12-25

摘要: 根据漏洞的威胁相关性,对网络安全漏洞进行重新分类.分析了主要的漏洞扫描技术及插件的开发方法.构建了分类漏洞插件,并给出了扫描插件的构造模型和主要的设计过程.实现了对漏洞的针对性扫描,为快速有效地更新扫描插件提供便利.

关键词: 信息安全;威胁;漏洞扫描;插件

Abstract: In the field of information security,Network security vulnerability scanning is essential to the assessment of the security of the system.The Network security vulnerability is reclassified according to the relevance of the vulnerability threat.It analyses the main technology of vulnerability scanning,advances the method to develop plugin,and proposes the way to classify vulnerability plugin.The plugin structural model and designing process are given,which can achieve the targeted vulnerability scanning,making it convenient to update quickly the new scanning plugin.

Key words: information security; threat; vulnerability scanning; plugin

[1] 孙钢锋,韩权印.网络隐患扫描器的设计与实现[J].计算机工程,2006,32(7):253-255.

[2] 葛先军,李志勇,何友.漏洞信息数据挖掘系统设计[J].计算机工程与设计,2009,30(4):883-886.

[3] 杨森,张新有.网络安全漏洞扫描器设计与实现[J].网络安全技术与应用,2008(11):24-26.

[4] 高慧萍,吕俊.插件式开发技术研究与实现[J].计算机工程与设计,2009,30(16):3805-3807.

[5] 彭永康,章义来.插件及其接口的研究与应用[J].计算机应用,2003,23(6):122-123.

[6] 肖辉,张玉清.Nessus插件开发及实例[J].计算机工程,2007,33(2):241-243.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!