The network vulnerability scanner based on port scanning and plugin is proposed in this article.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
In network security, the vulnerability scanner will find the hidden vulnerability.
在网络安全中漏洞扫描起着发现安全隐患的作用。
In network security, the vulnerability scanner will find the hidden vulnerability.
在网络安全中漏洞扫描起着发现安全隐患的作用。
应用推荐