期刊文献+

Web网站的安全代码设计 被引量:11

Safety Code Design for Website
原文传递
导出
摘要 针对Web网站突出的安全问题,详细分析了当前对Web网站安全威胁最严重的3种网络攻击:SQL注入、跨站和跨站请求伪造的实现原理和常用攻击方法,并结合研究和实践提出了具体的防范算法:采用过滤用户提交Web请求中的非法字符串代码实现了SQL注入及跨站的防范算法,具体代码使用了JSP中的Servlet过滤器实现;采用伪随机数对用户端身份进行持续认证的方式实现了跨站请求伪造算法。 For the prominent safety issue of the website, the paper analyzes in depth the three most serious attacks against the website security, that is, SQL injection, cross-site scripting, and cross-site request forgery. In combination of study and practice, an anti-attack algorithm against SQL injection and cross-site scritpting by filtering out the illegal string code from the requests of the website user is proposed, the servlet filter in JSP is employed to realize the specific code, while an anti-attack algorithm against cross-site request forgery by using pseudo-random number to continuously authenticate the user also presented.
出处 《信息安全与通信保密》 2010年第10期92-94,共3页 Information Security and Communications Privacy
关键词 SQL注入 跨站 跨站请求伪造 安全代码 SQL injection cross-site scripting cross-site request forgery safety code
  • 相关文献

参考文献3

二级参考文献8

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2张卓,薛质.Linux环境中基于PHP的SQL注入攻击与对策[J].信息安全与通信保密,2006,28(9):154-157. 被引量:4
  • 3Martin B,Brown M,Paller A.2009 CWE/SANS Top 25 Most Dangerous Programming Errors[EB/OL].[2009-10-23].http://cwe.mitre.org/top25/pdf/2009_cwe_sans_top_25.pdf.
  • 4Buehrer G,Weide B W,Sivilotti P A G.Using Parse Tree Validation to Prevent SQL Injection Attacks[C]//5th International Workshop on Software Engineering and Middleware.Lisbon,Portugal:[s.n.],2005:106-113.
  • 5Kieyzun A,Guo P J,Jayaraman K,et al.Automatic Creation of SQL Injection and Cross-site Scripting Attacks[C]//Proceedings of the 2009 IEEE 31st International Conference on Software Engineering.Vancouver,Canada:[s.n.],2009:199-209.
  • 6Halfond W G J,Orso A.AMNESIA:Analysis and Monitoring for NEutralizing SQL-injection Attacks[C]//Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering.Long Beach,CA,USA:[s.n.],2005:22-28.
  • 7王丽丽,彭一楠,王轶骏.浅析SQL盲注攻击的实现[J].信息安全与通信保密,2008,30(5):71-73. 被引量:5
  • 8黄玮,崔宝江,胡正名.Web应用程序客户端恶意代码技术研究与进展[J].电信科学,2009,25(2):72-79. 被引量:9

共引文献14

同被引文献45

引证文献11

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部