期刊文献+

一种高效的移动互联网网站安全监测方法研究与实现 被引量:4

Research and implementation of an efficient method for internet website security monitoring
下载PDF
导出
摘要 本文对一种高效的移动互联网网站安全监测方法进行了研究,提出了一种高效率的网站安全综合监测技术方案,并进行了实现,能够集中、统一对网站系统的实时安全状态进行监测,可为网站安全管理及监测工作提供汇总的统计数据,量化工作取得的成绩。可实现对移动互联网网站安全情况进行实时统一监测,准确、及时发现各网站存在的安全漏洞等隐患。 In this paper we studied an efficient mobile internet site security monitoring method, and we proposed a highly efficient technology solution for integrated website security monitoring. We made a system as the solution suggested which can monitor internet website security status for real time and it provides summary statistics to quantify the achievements. The system can scan internet web sites security situation on real-time for accurate result and detect virious vulnerabilities and other hazards exist on websites.
出处 《电信工程技术与标准化》 2013年第12期28-31,共4页 Telecom Engineering Technics and Standardization
关键词 移动互联网 网站安全 安全监测 网站漏洞扫描 mobile internet website security website monitoring web vulnerability scan
  • 相关文献

参考文献5

二级参考文献14

  • 1徐陋,姚国祥.SQL注入攻击全面预防办法及其应用[J].微计算机信息,2006,22(03X):10-12. 被引量:40
  • 2National Vulnerability Database(NVD)[Z]. [2009-04-16]. http://nvd.nist.gov/home.cfm.
  • 3Paros[Z]. [2009-04-16]. http://www.parosproxy.org/index.shtml.
  • 4XSS-Me[Z]. [2009-04-16]. http://www.securitycompass.com/exploite.tml.
  • 5Auronen L. Tool-based Approach to Assessing Web Application Security[D]. Helsinki, Finland: Helsinki University of Technology, 2002.
  • 6Klein A. DOM Based Cross Site Scripting or XSS of the Third Kind[EB/OL]. (2005-07-04). http://www.webappsec.org/projects/ articles/071105.html.
  • 7Shema M.Web Security Portable Reference[M].California:McGraw-Hill,2003-06.
  • 8Huang Yaowen,Huang S K,Lin T P.Web Application Security Assessment by Fault Injection and Behavior Monitoring[C]//Proc.of the 12th ACM International Conference on World Wide Web.Budapest,Hungary:[s.n.],2003.
  • 9Aidemork J,Vinter J,Folkesson P.GOOFI:Generic Object-Oriented Fault Injection Tool[C]//Proc.of IEEE International Computer Performance and Dependability Symposium.Goteborg,Sweden:[s.n.],2001.
  • 10Murnane T,Hall R,Reed K.Towards Describing Black-box Testing Methods as Atomic Rules[C]//Proc.of the 29th Annual International Computer Software and Applications Conference.Melbourne,Australia:IEEE Computer Society,2005.

共引文献29

同被引文献30

  • 1中国互联网信息中心.第36次中国互联网络发展状况统计报告[EB/OL].http://ww.cnnic.cn,20159.
  • 2国际电信联盟. 2014年信息与通信技术[EB/OL]. http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf, 2014-05-08.
  • 3国家互联网应急中心. 互联网安全威胁报告[EB/OL]. http://www.cert.org.cn/publish/main/upload/File/2015 monthly08.pdf, 2015-08-10.
  • 4Wang Cong, Wang Qian, Ren Kui, et al. Toward secure and dependable storage services in cloud computing[J]. IEEE Transactions on Services Computing, 2012,5(2):220-232.
  • 5Shar L K, Tan H B K. Defeating SQL injection[J]. IEEE Computer Society, 2013,46(3):69-77.
  • 6W3C. Document Object Model(DOM)[EB/OL]. http://www.w3.org/DOM/, 2005-02-19.
  • 7Fonseca J, Seixas N, Vieira M, et al. Analysis of field data on Web security vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(2):89-100.
  • 8吴润浦,方勇,吴少华.基于统计与代码特征分析的网页木马检测模型[J].信息与电子工程,2009,7(1):71-75. 被引量:15
  • 9徐鹏,林森.基于C4.5决策树的流量分类方法[J].软件学报,2009,20(10):2692-2704. 被引量:169
  • 10吴秋萍.云计算在电子政务系统中的应用研究[J].计算机与现代化,2011(7):116-120. 被引量:26

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部