期刊文献+

Web应用安全监测系统设计与应用 被引量:6

Design and applying of web application security detecting system
下载PDF
导出
摘要 针对Web应用的攻击种类繁多、变化多样,基于静态规则库的旧的防护体系已经很难适应当前Web应用安全的新状况,提出了将无指导学习方法与合法规则检测模型相结合的Web应用安全防护新思路,设计了基于Web应用结构分析和流程分析的安全监测算法,并进行了系统实现。实现的Web应用安全监测系统现已应用于清华大学网络学堂,很好地实现了对Web应用访问请求信息的安全分析与监测。 Attacks towards web applications evolve rapidly,traditional web protecting system based on static rules is difficult adapt to the new situation of web application security.A new idea and method are proposed to protecting web application security,which uses unsupervised learning algorithm and legal rule detecting model.Web application security detecting algorithm based on the structure and progress analysis of web application is designed and implemented.The system has been used on detecting of Tsinghua web learning system,done well on filtering the abnormal web accesses out.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第17期3760-3762,3811,共4页 Computer Engineering and Design
基金 国家科技支撑计划重点基金项目(2006BAK11B00)
关键词 WEB应用安全 Web应用安全监测 Web日志安全分析 无指导学习 合法规则监测 web application web application security web application security detecting web log security analysis unsupervised learning legal rule detecting
  • 相关文献

参考文献8

  • 1CNCERT.2006年上半年网络安全报告[DB/OL].http://www.cert.org.cn/articles/docs/common/2007013163191.shtml,2006.
  • 2Robertson W,Vigna G,Kruegel C,et al.Using generalization and characterization techniques in the anomaly-based detection of web attacks[C].Proceedings of Network and Distributed System Security Symposium Cunference,2006.
  • 3顾韵华,王兴,丁妮.Web应用安全扫描系统及关键技术研究[J].计算机工程与设计,2008,29(18):4715-4717. 被引量:7
  • 4Kruegel C,Vigna G,Robertson W.A multi-model approach to the detection of web-based attacks[J].Computer Networks,2005,48(5):717-738.
  • 5吴鹏,王晓峻,苏新宁.基于PKI/PMI的Web应用安全解决方案[J].计算机工程与应用,2006,42(6):1-3. 被引量:6
  • 6李庆华,姚静,赵峰.基于主动秘密共享的Web容侵策略研究[J].计算机工程与科学,2006,28(8):34-35. 被引量:3
  • 7William G J Halfond,Alessandro Orso,Panagiotis Manolios.Using positive tainting and syntax-aware evaluation to counter Sql injection attaeks[C].Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of Software enginee-ring,2006:175-185.
  • 8Ingham K L,Somayaji A,Burge J,et al.Learning DFA representations of HTTP for protecting web applications[J].Computer Networks,2007,51(5):1239-1255.

二级参考文献21

  • 1马瑞民,李向云.Web日志挖掘中数据预处理技术的研究[J].计算机工程与设计,2007,28(10):2358-2360. 被引量:19
  • 2Menczer F,Pant G,Ruiz M et al.Evaluating Topic-Driven Web Crawlers[C].In:The Proceedings of 24 th Annual ACM Conference on Research and Development in Information Betrieval,New Orleans,USA,2001:2103~2115
  • 3ITU-T Recommendation X.509.Information Technology-Open-System Interconnection The Directory:Public Key and AttributeCertificate Framework.2000
  • 4Zaiane,Osmar R.Building Virtual Web Views[J].Data andKnowledge Engineering,2001;39(2):143~163
  • 5Chadwick DW,Legg S.Internet X.509 Public Key Infrastructure LDAP Schema and Syntaxes for PMIs.http://www.ietf.org,2002-12
  • 6Housley R,Polk T,Ford W et al.Internet X.509 Public Key Infrastructure Certificate and certificate Revocation List(CRL)Profile[S].RFC3280,2002
  • 7Farrell S,Housley BAn Internet Attribute Certificate Profile for Authorization[S].RFC 3281,2002
  • 8Francis C Pinkas D.Attribute Certificate Policy extension.http://www.ietf.org,2002-10
  • 9Kuo Y F,Chen L S.Personalization technology application to Internet content provider[J].Expert Systems with Applications,2001;21(4):203~215
  • 10Y Deswarte, L Blain, J C Fabre. Intrusion Tolerance in Distributed Computing Systems[A]. Proc of the Int'l Syrup on Security and Privacy[C]. 1991. 110-121.

共引文献12

同被引文献57

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部