期刊文献+

SQL注入攻击防御策略的研究 被引量:9

Study on SQL Injection Attack Defense Strategy
下载PDF
导出
摘要 SQL注入攻击是Web应用中最常见的攻击,本文通过分析SQL注入攻击的原理,针对不同的攻击方法和不同的安全需求灵活使用多种防御策略堵住漏洞,如通过过滤或转义危险字符、使用正则表达式、使用URL重写技术等方法减少Web应用的风险。 SQL injection attack is the most common attack in Web application. This paper, by analyzing the principle of SQL injection attacks,discusses how to flexibily use a variety of defensive strategies to close the loopholes according to different attack methods, and different security needs to reduce the risk of Web applications, such as through a filter or escape dangerous characters,by using regular expressions , or using UR.L rewriting technology.
作者 吴贵山
出处 《计算机与网络》 2012年第9期70-73,共4页 Computer & Network
关键词 SQL注入 防御策略 正则表达式 SQL injection defense strategy URL rewriting technology
  • 相关文献

参考文献5

二级参考文献12

  • 1张勇,李力,薛倩.Web环境下SQL注入攻击的检测与防御[J].现代电子技术,2004,27(15):103-105. 被引量:55
  • 2余静,高丰,徐良华,朱鲁华.基于SQL注入的渗透性测试技术研究[J].计算机工程与设计,2007,28(15):3577-3579. 被引量:8
  • 3Kals S, Kirda E, Kruegel C, et al. SecuBat: a Web vul- nerability scanner[C]//Proceedings of the 15th Interna- tional Conference on World Wide Web, Edinburgh, Scotland, 2006. New York, NY, USA: ACM Press, 2006: 247-256.
  • 4Williams J, Wichers D. OWASP top 10-2010 rcl[R]. Washington: OWASP, 2010.
  • 5Zhang Zhuo. SQL injection attack techniques and coun- termeasures analysis[D]. Shanghai: Shanghai Jiao Tong University, 2007.
  • 6Xu Liang. Research and implementation of Web applica- tion vulnerability scanning system based-on network[D] Changsha: National University of Defense Technology 2005.
  • 7Yin Hong. Research and implementation of active scanner against loophole embedded in Web application pro- gram[D]. Changsha: National University of Defense Technology, 2005.
  • 8Stuttard D, Pinto M. The Web application haker's hand- book[M]. Shi Huayao. Beijing: Posts & Telecom Press, 2009: 160-201.
  • 9Anley,C.Advanced SQL Injection In SQL Server Applications[OL]. http://www.ngssoftware.com/papers/advanced_sql_injection.pdf . 2007
  • 10Stephen Kost.An Introduction to SOL injection attacks for Oracle developers. http://www.integrigy.com/papers.htm . 2007

共引文献23

同被引文献54

引证文献9

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部