Network scanner design and implementation

xiaoxiao2021-03-06  16

Network scanner design and implementation

Abstract: Information security is to ensure the reliable operation of computer system software, application software and network software; non-authorization access, acquisition and tampering of information; guarantee information integrity and availability. This paper analyzes the role and design of network scanners in the information security field. Keywords: information security, network vulnerability, socket, distributed denial, simple mail transmission protocol, a scanner software overview computer network rapid development has triggered people's attention to network security, the goal of information security lies in protection of information confidentiality , Integrity, and legal users to provide services. Network vulnerability is a weakness of the system soft and hardware, and the presence of security vulnerabilities causes the illegal user intrusion system or unauthorized access to access, resulting in information tampering and leak, deny service or system crash. System administrators can use network tools to implement system security audits according to security policies. 1.1 Scanner Function Scanner is a software that detects remote or local system security fragility; uses a connection to the target host TCP / IP port and requests some services (such as Telnet, FTP, etc.) to record the response of the target host. To collect information related information for target hosts (if an anonymous user can log in), discover some of the internal security weaknesses of the target host. The importance of the scanner is to automatically complete the extremely cumbersome security detection, which is automatically completed by the program, which not only reduces the work of the manager, but also shortens the test time, so that the problem is faster. Of course, it can also be considered that the scanner is a network security assessment software. In general, the scanner can be evaluated quickly and in-depth. 1.2 Scanner Classification From the perspective of information flow, it can be divided into data storage security and network transmission security (related to operating system security and application security), any of the networks appears Unsafe factors can damage the security of the entire information, so divide the scanner into three categories: database security scanner, operating system security scanner and network security scanner (for network services, applications, network equipment, network protocols Wait). In-depth understanding of the vulnerability of the scanned object, can better use the program to automatically detect whether there is existing vulnerability; provide a good solution to the problem that can be discovered when scanning; can be implemented in the system Efficiency and provide corresponding remedies. Two-Network Scanner Design Scanning Network Scanner is a software involving wide knowledge, dynamic, and should have functions that are easy to configure, easy to expand, fast scan, intelligent report, and depth analysis. Network scan is an analysis assessment of system vulnerability, can check, analyzing security within network, network services, operating system, database system, etc.,