期刊文献+

基于内容的Ajax异常检测技术研究

Ajax Anomaly Detecting Technology based on Payload Data
原文传递
导出
摘要 Ajax技术不断增加的复杂度、透明度以及代码量,大大增加了Ajax应用系统的攻击面和信息泄露的可能性。针对Ajax架构的漏洞特点和攻击行为,从数据包载荷内容的角度上对Ajax异常请求做出分析研究,总结出Ajax异常数据包的特征,并通过改进的BM算法进行特征提取,最后通过评估算法对提取的特征进行异常判断。实验结果表明,相对于传统的入侵检测方法,采用提出的Ajax异常检测技术能够比较高效准确地完成对Ajax异常请求的检测。 With the increasing complexity, transparency and code of Ajax technology, the attack surface and possibility of information leakage for Ajax application system is greatly enhanced. Aiming at the loophole characteristics of and aggressive behavior against Ajax structure, this paper, from the content of data packets payload, analyzes and studies the anomalous request packet by Ajax, summarizes the characteristics of anomalous data packets of Ajax, and the feature extraction is implemented with the improved BM algorithm. Finally an anomaly judgment on these extracted characteristics is done through the evaluation algorithm. The experimental results show that, compared with the traditional intrusion detection methods, the Ajax anomaly detecting technology proposed in this paper could accurately and efficiently complete the detection of Ajax anomalous request.
作者 吕景旭 吴静
出处 《通信技术》 2012年第1期119-121,124,共4页 Communications Technology
关键词 Ajax攻击 JavaScr ipt代码 特征提取 异常检测 Ajax attack JavaScript code feature extraction anomaly detection
  • 相关文献

参考文献8

二级参考文献36

  • 1王杰,李冬梅.数据挖掘在网络入侵检测系统中的应用[J].微计算机信息,2006,22(04X):73-75. 被引量:15
  • 2周四伟,蔡勇.AC-BM算法的改进及其在入侵检测中的应用[J].微计算机应用,2007,28(1):27-31. 被引量:5
  • 3Kreibich C, Crowcroft J.Honeycomb -creating intrusion detection signatures using honeypots[C]//Proceedings of the Second Workshop on Hot Topics in Networks(HotNets-Ⅱ),November 2003.
  • 4Kim H A,Karp B.Autograph:Toward automated,distributed worm signature detection[C]//Proceedings of the 13th USENIX Security Symposium,August 2004.
  • 5Singh S,Estan C,Varghese G,et al.Automated worm fingerprinting[C]// Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation(OSDI),Dee 2004.
  • 6Newsome J,Karp B,Song D.Polygraph:Automatically generating signatures for polymorphic worms[C]//IEEE Security and Privacy Symposium, 2005.
  • 7Li Z,Sanghi M,Chen Y,et al.Hamsa:Fast signature generation for zero-day polymorphic worms with provable attack resilience[C]//IEEE Symposium on Security and Privacy,Oakland,CA,May 2006.
  • 8Wang K,Stolfo S.Anomalous payload-based network intrusion detection[C]//RAID, 2004.
  • 9Yegneswaran V,Giffin J,Barford P,et al.An architecture for generating semantic-aware signatures[C]//USENIX Security Symposium,2005.
  • 10Newsome J,Song D.Dynamic taint analysis for automatic detection, analysis,and signature generation of exploits on commodity soft- ware[C]//Proc of the 12th Annual Network and Distributed System Security Symposium(NDSS), 2005.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部