您好,欢迎访问三七文档
当前位置:首页 > 学术论文 > 毕业论文 > 毕业论文-计算机应用技术一班-侯善峰
2015届学生毕业设计(论文)浅析搜索软件对网络安全的影响系别:电子计算机系年级:2012级学号:201210110011姓名:侯善峰专业:计算机应用技术指导教师:吴艳二〇一五年四月摘要I摘要现今搜索软件已经渗透到Internet每个角落,甚至一些配置不当的数据库、网站里的私人信息,对网络资源的搜索已经逐渐成为病毒和黑客窥视的焦点,对网站、局域网的安全构成了严重的威胁。搜索软件能用来搜索秘密文件。搜索软件中的FTP搜索软件,与HTTP搜索软件相比,存在着更大的网络漏洞。诸如LycosFTP的搜索软件,它产生的成千上万的网络链接能够探测到一些配置不当的FTP服务器上的敏感信息。任何网络使用者,使用这种搜索软件,都可以链接到一些保密的数据和信息,更不用说一些资深的黑客了。本文从搜索软件对网络安全的影响入手,随后进行了系统分析,接着进行了归类总结。本系统主要包含四个模块,分别是:搜索引擎、网络安全、对搜索引擎的利用、针对GoogleHack的防护。关键词:网络安全搜索引擎黑客ABSTRACTIIABSTRACTSearchtoday'ssoftwarehaspenetratedintoeverycorneroftheInternet,andevensomepoorlyconfiguredprivateinformationdatabases,Websites,searchfornetworkresourcesisbecomingafocusofvirusesandhackerspeeping,onsite,posingaseriousthreattothesecurityoflocalareanetwork.Searchsoftwarecanbeusedtosearchforsecretdocuments.FTPsoftwareforsearchinginthesearchsoftware,comparedwithHTTPsearchsoftware,thereisagreaterdegreeofvulnerabilityinyournetwork.Searchsoftware,suchasLycosFTP,itproducesthousandsofnetworklinkscanbedetectedbysensitiveinformationonsomemisconfiguredFTPservers.Anynetworkuser,usingthissoftware,youcanlinktosomeconfidentialdataandinformation,nottomentionsomeveteranhackers.Articlestartswiththesearchsoftwareimpactonnetworksecurity,followedbyasystematicanalysis,summarizedthethen.Thissystemconsistsoffourmodules,namely:searchengines,networksecurity,andtheuseofsearchengines,protectionagainstGoogleHack.Keywords:NetworksecuritySearchengineHacker目录III目录第1章搜索引擎.....................................................................................11.1搜索引擎的分类...........................................................................................11.1.1全文索引.............................................................................................................11.1.2目录索引.............................................................................................................21.1.3元搜索.................................................................................................................31.1.4垂直搜索.............................................................................................................31.1.5集合式搜索.........................................................................................................31.1.6门户搜索.............................................................................................................31.2工作原理.......................................................................................................31.3历史起源.......................................................................................................41.4发展...............................................................................................................5第2章网络安全...................................................................................102.1主要特征.....................................................................................................102.2网络安全分析.............................................................................................122.3主要类型.....................................................................................................142.4技术原理.....................................................................................................142.5主要问题.....................................................................................................152.6误解.............................................................................................................17第3章对搜素引擎的利用..................................................................193.1搜索也是一门艺术.....................................................................................193.2GoogleHack.................................................................................................193.3具体步骤.....................................................................................................203.3.1寻找网站的后台登录地址...............................................................................203.3.2随意浏览网站中的文件...................................................................................213.3.3搜索相关页面...................................................................................................213.3.4找到网站数据库...............................................................................................21第4章针对GoogleHack的防护......................................................234.1robots.........................................................................................................234.2gooscan.......................................................................................................244.3SiteDigger.................................................................................................254.4wikto...........................................................................................................254.5Googlehack蜜罐......................................................................................26结论.......................................................................................................27致谢..................................
本文标题:毕业论文-计算机应用技术一班-侯善峰
链接地址:https://www.777doc.com/doc-2273823 .html