期刊文献+

CRSF攻击机制及防御策略研究 被引量:2

CSRF Attack Mechanism and Defense Strategy
原文传递
导出
摘要 跨站点请求伪造(Cross-Site Request Forgery)是一种互联网上广泛存在的网络攻击,它通过第三方伪造用户请求来欺骗服务器端,达到冒充用户身份、行使用户权利的目的。文中通过分析跨站点请求伪造攻击的原理,并模拟其攻击过程、解析攻击产生的原因来向读者详细介绍此类攻击的特点,并从服务器端和客户端两个方向讨论了防御此类攻击的策略。 Cross-site request forgery is a widespread network attack on the Internet. Through request forgery by the third party, this attack deceives the server, passes itself off as the user and exercises the rights of the users. This paper describes the characteristics of CSRF and analyzes the principle of CSRF. And meanwhile simulation on the attack process and exploration on the cause of this attack are also done, and the defense strategies against this attack discussed from both server and client sides.
出处 《信息安全与通信保密》 2014年第1期72-74,共3页 Information Security and Communications Privacy
关键词 请求伪造 输入过滤 随机参数 双向验证 request forgery input filter random parameter two-way authentication
  • 相关文献

参考文献7

二级参考文献28

  • 1刘静.构建电子政务安全防御体系[J].信息安全与通信保密,2007,29(1):119-121. 被引量:2
  • 2张楠,张振国.基于规则的检测SQL注入攻击方法的研究[J].陕西科技大学学报(自然科学版),2007,25(2):121-123. 被引量:8
  • 3Dr.Jean Paul Ballerini,IBM X-Force:Web Application Security[OL],http://www-05.ibm.com/iI/news/events/Xforce/downloads/3_X-Force-Web-Application-Security.pdf.
  • 4THE TEN MOST CRITICAL WEB APPLICATION SECURITY VULNERABILITIES FOR,JAVA ENTERPRISE APPLICATIONS[OL],https://www.owasp.org/images/8/89/OWASP-Top-10_2007-for_JEE.pdf.
  • 5http://www.webappsec.org/projects/whid/byyear_year_2008.shtmI.
  • 6William Zeller and Edward w.Felten,Cross-Site Request Forgeries:Exploitation and Prevention[OL],http://www.CS.ucdavis.edu/~hchen/teaching/ecs153-w09/paper/csrf-zeller.pdf.2008.10.15.
  • 7Web Application Session Management secologic Whitepaper[OL],2007,http://www.secologic.org/.
  • 8http://www.owasp.org/index.Php/Cross-Site-Request-Forgery-(CSRF).
  • 9http://security.widyani.com/web-application-securjty/problem-and-solution-cross-site-request-forgery-xsrf.html.
  • 10Adam Barth、Collin Jackson、John C.Mitchell,Robust Defenses for Cross-Site Request Forgery[OL],http://www.adambarth.corn/papers/2008/barth-jackson-mitchell-b.pdf,2008.

共引文献16

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部