期刊文献+

一种Web软件安全漏洞分类方法 被引量:9

Taxonomy of Web-based application vulnerabilities
下载PDF
导出
摘要 研究了环境错误与状态错误引发Web应用软件安全问题的途径,在此基础上提出了一种用于进行Web应用软件安全漏洞分类的层次分析模型。使用该模型对CVE漏洞数据库中抽取的Web软件安全漏洞进行了分类,并与使用EAI模型分类的结果做了对比。评估结果表明,该模型具备良好的漏洞分类能力,适用于指导Web应用软件的安全测试和安全防御工作。 This paper studies how the environmental fault and states fault cause the security problems of Web application,and describes a taxonomy model using analytic hierarchy process for classifying security flaws of Web application.Then design an experiment to apply the taxonomy model to classify 152 security flaws from the CVE security flaw database,and compare the classification results with that of using EAI model to classify security flaws.The results of the experiment reveals that the taxonomy model is effective and applicable to the security testing and defending of Web-based application.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第25期10-14,20,共6页 Computer Engineering and Applications
基金 国家部委项目
关键词 WEB应用软件 安全漏洞 分类模型 Web-based application security flaw taxonomy model
  • 相关文献

参考文献11

  • 1Landwehr C E,Bull A R,Mcderrnoll J P,et al.A taxonomy of computer program security flaws WA 20375 -5337 [R].Information Technology Division, Naval Research Laboratory, Washington D C, 1994.
  • 2Krsul I V.Software vulnerability analysis[D].Purdue University,Computer Sciences Department,1998.
  • 3Common Vulnerability Enumeration[EB/OL].http://cve.mitre.org/cve/ index.html.
  • 4Du Wenliang,Mathur A P.Vulnerability testing of software system using fault injection,Coast YR 98-02[R].1998.
  • 5Anley C.Advanced SQL injection in SQL server applications[Z].An NGS Software Insight Security Reaserch(NISR) Publication,2002.
  • 6Grossman J.Cross-site scripting worms and viruses:The impending threat and the best defense [EB/OL].http://www.whitehatsec.com/ downloads/WHXSSThreat s.pdf.
  • 7Piessens F.A taxonomy of causes of software vulnerabilities in internet software[C]//Supplementary Proceedings of the 13th International Symposium on Software Reliability Engineering,2002:47-52.
  • 8Jiwnani K,Zelkowitz M.Susceptibility matrix:A new aid to software auditing[J].IEEE Security and Privacy,2004,2(2):16-21.
  • 9Weber S,Karger P A,Paradkar A.A software flaw taxonomy:Aiming tools at security[C]//Software Engineering at Secure SystemsBuilding Trustworthy Applications(SESS'05).[S.l.]:ACM Press,2005.
  • 10Bazaz A,Arthur J.Towards a taxonomy of vulnerabilities[C]//Proceedings of the 40th Annual Hawaii International Conference on System Sciences(HICSS' 07), Hawaii, USA, 2007.

同被引文献67

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部