期刊文献+

非入侵式网络安全扫描技术研究 被引量:4

Non- intrusive Network Security Scanning Technology
下载PDF
导出
摘要 网络安全扫描技术受到了攻防双方的高度重视。对攻击者而言,可用于对目标网络的侦察探测,获取其环境及存在的漏洞等;对防御者而言,可用于对受保护网络渗透测试的基础性工作。根据是否与目标网络发生交互,网络安全扫描可划分为入侵式和非入侵式。其中,非入侵式可有效隐蔽扫描行为,减小对目标网络运行的影响,并避免触发防火墙、入侵检测系统的报警。回顾了传统入侵式网络安全扫描技术的发展,针对当前借助搜索引擎实现非入侵扫描的方法,分析总结了基于通用搜索引擎和专用搜索引擎两类非入侵式扫描技术的原理与方法,并结合相关实验结果对各自的优缺点进行了总结。最后,讨论了非入侵式扫描技术的发展趋势和进一步的研究方向。 Network security scanning technology (NSST) is highly appreciated by both attackers and defenders. With NSST, attack- ers may detect targeted network for the intelligence of its environment and exiting vulnerabilities, and defenders may complete ancillary work like penetration testing for protected networks. Based on existence or non-existence of interaction with targeted network, NSST may be divided into two categories-intrusive and non-intrusive, of which the non-intrusive could effectively coven its scanning behav- ior, reduce its impact on the targeted network and avoid triggering the alarm of firewalls and intrusion detection systems. This paper re- views the development of traditional intrusive NSST. As for that the current realization of non-intrusive NSST relies on search engines, the principles and methods of two non-intrusive NSST technologies based on general and specialized seareh engines, are analyzed and summarized, and in combination of relevant experiment, their advantages and disadvantages are summed up. The development trend of non-intrusive NSST and next-step research directions are finally discussed in the paper.
出处 《信息安全与通信保密》 2016年第9期67-72,76,共7页 Information Security and Communications Privacy
关键词 非入侵式 网络安全扫描 搜索引擎 Shodan non-intrusive network security scanning search engine Shodan
  • 相关文献

参考文献20

  • 1同家互联网应急中心.2014年中国互联网网络安全报告[EB/OL].北京:国家计算机网络应急技术处理协调中心.(2015-05-10)[2016.07.10].http://www.eert.org.err/.
  • 2张红旗,王鲁.信息安全技术[M].北京:高等教育出版社,2008. 176-177.
  • 3Durumeric Z, Wustrow E, Halderman J A.ZMap: Fast Intemet -wide Scanning and Its Security Applications [ C ]// Usenix Conference on Security.San Jose:USEN1X Association, 2013: 605-620.
  • 4Durumeric Z, Adrian D, Mirian A, et al.A Search Engine Backed by Internet-Wide Scanning [ C ]//ACM Sigsac Confer- ence on Computer and Communications Security. Colorado: ACM, 2015 : 542-553.
  • 5404TeamfromKnownsee.ZoomEye搜索引擎[EB/OL].北京:知道创字信息技术有限公司.(2013-06-20)[2016-07-10].https://www.zoomeye.ors/.
  • 6余弦.ZoomEye+Seebug二进制恶魔果实的神奇力量初探与思考[EB/OL].北京:知道创宇信息技术有限公司.(2016-06-20)[2016-07-10].http://www.weixinla.com/docu-menul7452935.html.
  • 7Genge B, Graur F, Enichescu C. Non-intrusive Techniques for Vulnerability Assessment of Services in Distributed Systems [J]. Procedia Technology, 2015 (19) :12-19.
  • 8Duggan D P. Penetration Testing of Industrial Control Systems [ S]. Sandia National Lab, 2005:5-7.
  • 9于磊,屈樊,吴礼发.漏洞扫描技术研究[c]//全国青年通信学术会议.北京:中国通信学会青年工作委员会,2007:985-990.
  • 10胡惊涛,李华波,陈刚.网络安全扫描技术研究[C]//全国青年通信学术会议.山东:中国通信学会青年工作委员会,2008:593-598.

二级参考文献4

  • 1郑辉,李冠一.Google Hacking与智能蠕虫防治[J].信息安全与通信保密,2005,27(8):70-73. 被引量:3
  • 2李玮.“暗世界”搜索Shodan:能搜核电站控制系统.http://tech.sina.com.cn/i/csj/2013-04-10/09368225606.shtml, 2013-4-10.
  • 3二十一世纪商业评论.黑暗系“谷歌”Shodan另一种方式的搜索http://www.chinaz.com/news/2013/0730/311534.shtml, 2013-7-30.
  • 4中国信息产业网.基于物联网的搜索引擎产业如何发展.http://www.d 1 net.corn/iot/market/227570.html.2013-7-23.

共引文献10

同被引文献30

引证文献4

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部