Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4912
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJhala, Nikita Y.-
dc.date.accessioned2014-08-27T07:09:59Z-
dc.date.available2014-08-27T07:09:59Z-
dc.date.issued2014-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/4912-
dc.description.abstractNetwork scanning and vulnerability testing relies on tools and processes to scan the network and its devices for vulnerabilities. This aids in refining any organization's security policy due to identification of vulnerabilities, and guarantees that the security measures taken actually gives the protection that the organization expects and requires. Administrator needs to perform vulnerability scan periodically which helps them to uncover shortcomings of network security that can lead to device or information being compromised or destroyed by exploits. Different implementations & tools of network scanning have distinctive proficiency and have different kinds of outputs. These outputs are typically heterogeneous which makes the further analysis a challenging task. In this dissertation, two basic open source scanners are considered NMAP & OpenVAS. We show how to incorporate this two scanners into a decently outlined GUI and give reliable information. On the basis of impediments of NMAP and OpenVAS, another tool is developed which holds best of both devices alongside overcoming few drawbacks. Network scanner created under this dissertation performs scanning over the network identifying the active hosts and conjecture the OS of the remote hosts and installed programs into the remote hosts. Apart identifying the active hosts it could find open ports and list the services which are running in the host. Further vulnerabilities scanning is performed by comparing the information obtained from a network scan to a database of vulnerability signatures to produce a list of vulnerabilities that are presumably present in the network. Along with performing network scanning and vulnerability assessment, auto-scan mechanism is also added in new tool to test device when they are compromised. In this dissertation, features of new tool is explored. In other words, network mapping, vulnerabilities and configuration faults in network are shown in various formats. Also, an easy approach is defined to reduce the scan duration of vulnerability.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries12MCEI12;-
dc.subjectComputer 2012en_US
dc.subjectProject Report 2012en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject12MCEIen_US
dc.subject12MCEI12en_US
dc.subjectINSen_US
dc.subjectINS 2012en_US
dc.subjectCE (INS)en_US
dc.titleNetwork Scanning & Vulnerability Assessment with Report Generationen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
12MCEI12.pdf12MCEI124.95 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.