期刊文献+

SQL注入漏洞多等级检测方法研究 被引量:18

Research on SQL Injection Vulnerability Multi-level Detection Method
下载PDF
导出
摘要 在深入分析SQL(structured query language)注入攻击特点、攻击方式及SQL注入漏洞相关防御机制的基础上,依据防御度的高低对SQL注入漏洞进行分级。将漏洞分级作为SQL注入模糊测试用例等价类划分的依据,对SQL注入参数进行优化选择后,模拟黑客攻击的方式主动地、有针对性地进行检测。SQL注入参数的等价类划分保证了模糊测试过程的完备性和无冗余性。 On the basis of an in-depth analysis of characteristics of SQL(structured query language) injection attacks and defense mechanisms related to SQL injection vulnerability,this paper grades the SQL injection vulnerability according to the level of defense degree,and takes the vulnerability grading as the basis for the equivalence partitioning of SQL injection fuzz testing case.After the optimized choice of SQL injection parameters,it detects the SQL injection vulnerabilities of target Web system initiatively and effectively by imitating hacker attacks,which makes the detection more target-oriented.The equivalence partition of SQL injection parameters ensures the completeness and no redundancy of fuzz testing.
出处 《计算机科学与探索》 CSCD 2011年第5期474-480,共7页 Journal of Frontiers of Computer Science and Technology
基金 天津市科技攻关项目 No.08ZCKFGX01100~~
关键词 漏洞检测 结构化查询语言(SQL) SQL注入 分级 模糊测试 等价类划分 vulnerability detection structured query language(SQL) SQL injection grading fuzz testing equivalence partitioning
  • 相关文献

参考文献7

  • 1Zhang Zhuo. SQL injection attack techniques and coun- termeasures analysis[D]. Shanghai: Shanghai Jiao Tong University, 2007.
  • 2Stuttard D, Pinto M. The Web application haker's hand- book[M]. Shi Huayao. Beijing: Posts & Telecom Press, 2009: 160-201.
  • 3余静,高丰,徐良华,朱鲁华.基于SQL注入的渗透性测试技术研究[J].计算机工程与设计,2007,28(15):3577-3579. 被引量:8
  • 4Yin Hong. Research and implementation of active scanner against loophole embedded in Web application pro- gram[D]. Changsha: National University of Defense Technology, 2005.
  • 5Xu Liang. Research and implementation of Web applica- tion vulnerability scanning system based-on network[D] Changsha: National University of Defense Technology 2005.
  • 6Williams J, Wichers D. OWASP top 10-2010 rcl[R]. Washington: OWASP, 2010.
  • 7Kals S, Kirda E, Kruegel C, et al. SecuBat: a Web vul- nerability scanner[C]//Proceedings of the 15th Interna- tional Conference on World Wide Web, Edinburgh, Scotland, 2006. New York, NY, USA: ACM Press, 2006: 247-256.

二级参考文献7

共引文献7

同被引文献101

引证文献18

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部