期刊文献+

Web2.0环境下SQL注入漏洞注入点提取方法 被引量:6

Injection Point Extraction Approach in SQL Injection Vulnerability under Web2.0 Environment
下载PDF
导出
摘要 为解决Web2.0环境中Web网站的SQL注入漏洞检测问题,提出了一种注入点提取方法。根据Web2.0网站的技术特点,通过分析网页HTML标记,解析执行网页客户端脚本,全面提取网站的数据输入点。根据数据输入点类型和参数组成,构建测试用例并建立注入点判定规则,从而提高了SQL注入漏洞检测效果。实验结果表明,增加脚本解析和数据输入点提取后,提高了Web2.0环境中SQL注入漏洞检测的测试覆盖率,降低了漏检率。本方法对使用传统技术和Web2.0技术网站进行的SQL注入漏洞检测,都具有适用性,能够获得较为全面的测试结果。 To solve the SQL injection vulnerability detection in website under Web2.0 environment, proposed an injection point extraction approach. According to the characteristics of Web2.0 websites, by analyzing HTML markup, parsing and executing web client script, this approach got comprehensive data entry points of the website. Depending on the type of data entry points and arguments,built test case and established the rule to determine injection points, thereby enhancing the SQL injection vulnerability detection. Experimental results showed that, after adding script analysis and data entry point extraction, the approach of SQL injection vulnerability detection under Web2.0 envi ronment increased test coverage and reduced the rate of missing. This approach that used to detect SQL injection vulnerability in website which used traditional and Web2.0 technologies, had some applicability,could gain a more comprehensive test results.
出处 《计算机技术与发展》 2013年第3期121-124,128,共5页 Computer Technology and Development
基金 西北工业大学基础研究基金(JC201149) 西北工业大学研究生创业种子基金项目(Z2012141)
关键词 WEB2 0 SQL注入漏洞 漏洞检测 脚本解析 注入点提取 Web2.0 SQL injection vulnerability vulnerability detection script analysis injection point extraction
  • 相关文献

参考文献12

  • 1The Open Web Application Security Project. OWASP Top I0 - 2010 [ EB/OL]. 2010-03 - 19 [2011-09-20]. http:// owasptopl0, googlecode, com/files/OWASP Top 10 - 2010. pdf.
  • 2Clarke J.SQL注入攻击与防御[M].黄晓磊,李化,译.北京:清华大学出版社,2010.
  • 3Chen Jan-Min, Wu Chia-Lun. An Automated Vulnerability Scanner for Injection Attack Based on Injection Point [ C ]// International Computer Symposium. Taiwan: [ s. n. ] ,2010.
  • 4Zakas NC.JavaScript高级程序设计[M].李松峰,曹力译.第2版.北京:人民邮电出版社,2010.
  • 5HOPE P, WALTBER B. Web安全测试[M].傅鑫,等译.北京:清华大学出版社,2010.
  • 6彭赓,范明钰.基于改进网络爬虫技术的SQL注入漏洞检测[J].计算机应用研究,2010,27(7):2605-2607. 被引量:19
  • 7Wang Xin, Wang Luhua, Wei Gengyu, et al. Hidden Web Crawling for SQL Injection Detection[ C]//3rd IEEE Interna- tional Conference on Broadband Network and Multimedia Technology (IC-BNMT). Beijing: [ s. n. ] ,2010.
  • 8Halfond W G J, Viegas J, Omo A. A Classification of SQL In- jection Attacks and Countermeasures[ C]//International Sym- posium on Secure Software Engineering. Washington DC,USA: [ s. n. ] ,2006.
  • 9国家计算机网络应急技术处理协调中心.国家信息安全漏洞共享平台(CNVD)[EB/OL].2010-04[2012一04].hf_tp:,/ww.cnvd.org.cn/publish/main/index.html.
  • 10Network Working Group. Hypertext Transfer Protocol - HTrP/ 1.1 [ EB/OL]. 2004 -09 -01 [ 2011-09 -24 ]. http ://www. w3. org/Protocols/rfc2616/rfc2616, html.

二级参考文献17

  • 1陈小兵,张汉煜,骆力明,黄河.SQL注入攻击及其防范检测技术研究[J].计算机工程与应用,2007,43(11):150-152. 被引量:72
  • 2[1]Eich B. JavaScript C Engine Embedder's Guide[EB/OL]. Http://www.mozilla.org/js/spidermonkey/apidoc/jsguide.html, mozilla.org, march 16, 2000.
  • 3[2]ECMA. ECMA-Script Language Specification Edition 3[EB/OL]. Http://www.mozilla.org/js/language/E262 3.pdf, European Computer manufacturer Association, march 24, 2000.
  • 4[3]Netscape. JavaScript C Engine API Reference[EB/OL]. http://developer.netscape.com/docs/manuals/javascriptapi/index.htm, Netscape Communications Corp., December 17, 1998.
  • 5[4]Netscape. JavaScript 1.5 References[EB/OL]. http://devedge.netscape.com/library/manuals/2000/javascript/1.5/guide/, Netscape Communications Corp., September 28, 2000.
  • 6National Vulnerability Database.National vulnerability database(NVD) CVE statistics[EB/OL].(2009-12).http://web.nvd.nist.gov/view/vuln/statistics-results?cid=4.
  • 7OWASP.Top 10 2007[EB/OL].(2009-11).http://www.owasp.org/index.php/Top_10_2007.
  • 8BANDHAKAVI S,BISHT P,MADHUSUDAN P,et al.CANDID:preventing SQL injection attacks using dynamic candidate evaluations[C] //Proc of the 14th ACM Conference on Computer and Communications Secirity.New York:ACM Press,2007:12-24.
  • 9FRIEDL J E F.Mastering regular expressions[M].2nd ed.[S.l.] :O'Reilly Media Inc,2005:10-21.
  • 10PESSOA J.Detecting SQL injection vulnerabilities in Web services[C] //Proc of the 4th Latin-American Symposium on Dependable Computing.Joao Pessoa,Brazil:IEEE Computer Society,2009:17-24.

共引文献56

同被引文献38

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部