期刊文献+

基于恶意注入和行为监控的SQL注入安全测试和评估 被引量:2

Security Testing and Assessment of Malicious SQL Injection and Behavior Monitoring
下载PDF
导出
摘要 SQL注入是黑客使用的一种攻击方式,该攻击主要通过WEB应用来获取、操纵、伪造或删除WEB应用后端的关系型数据库。论述了SQL注入的原理和方法,研究如何生成一个SQL注入自动探测和评估工具及关键技术,并讨论了一定数量的软件测试方法(包括黑盒测试、恶意注入和行为监控)。 SQL Injection is a hacking method that allows an attacker to access a database server. The attacker is then free to extract, modify, add, delete content from the database. The principle and methods of SQL Injection are discussed. Researches are done on how to build a tool and key technologies to detect and assess SQL Injection. A number of software testing techniques are also discussed including black- box testing, fault injection, and behavior monitoring as well.
出处 《株洲工学院学报》 2006年第4期18-21,共4页 Journal of Zhuzhou Institute of Technology
关键词 WEB应用 SQL注入 探测 评估 WEB application SQL injection detect assess
  • 相关文献

参考文献9

  • 1张文增,林晓森,赵冬斌,孙振国,陈强.ASP网站安全研究[J].计算机工程,2002,28(3):270-273. 被引量:23
  • 2单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58
  • 3窦丽华,蒋庆华,李晨晖.基于Web的信息系统安全研究[J].北京理工大学学报,2002,22(3):360-364. 被引量:15
  • 4邱江涛,冉昱鸻.有关ASP编程安全性的一些探讨[J].计算机与网络,2004,30(1):84-85. 被引量:1
  • 5Stephen W Boyd, Angelos D. Keromytis SQLrand: Preventing SQL Injection Attacks[EB/OL]. [2004 - 10 - 23]. http://www1. cs. columbia. edu/angelos/Papers/sqlrand.pdf.
  • 6Anley. Advanced SQL Injection In SQL Server Applications[EB/OL]. [2005-01-15].http://www. nextgenss.com/papers/advanced-sql-injection.pdf.
  • 7Liu C, Kung D, Hsia P, etc. Structural testing of WEB applications[J] .The 11th IEEE International Symposium on Software Reliability Engineering, 2000(10): 84-96.
  • 8Bruno Caprile. Analysis and Testing of WEB Application [ EB/OL]. [2005 - 06 - 27]. http://sstar.itc. it/Abstracts/web -analysis.pdf.
  • 9Sanctum Inc. AppShield 4.0 Whitepaper[ EB/OL]. [ 2005 -06- 27]. http://www.sanctuminc.com.

二级参考文献12

  • 1[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996
  • 2[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996
  • 3[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998
  • 4[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000
  • 5[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983
  • 6[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990
  • 7J.D. Meier, Alex Mackman等著.《Improving Web Application Security》. HTTP://msdn.Microsoft.com.
  • 8李建萍,郭学理,吕宏辉.WWW安全问题的分析与防范策略[J].计算机工程,1999,25(2):54-56. 被引量:6
  • 9赵战生,冯登国.信息安全技术讲座(三)数据库和操作系统的安全[J].中国金融电脑,1999,0(5):58-64. 被引量:4
  • 10朱铁峰,徐永晋.如何构筑安全可靠的Web数据库应用系统[J].微计算机信息,2000,16(3):13-15. 被引量:12

共引文献91

同被引文献3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部