期刊文献+

中小型网站智能安全检测研究 被引量:1

Study on Small and Medium-sized Websites Intelligent Safety Inspection
下载PDF
导出
摘要 随着互联网的发展及经济利益的驱动,黑客已将攻击重点转到Web应用服务器上,由此危害了服务器安全及客户端安全。针对这一现状,文章首先采用广度优先算法实现网络爬虫来获取目标网站的架构信息;然后用网页动态参数判定、网站架构分析、信息智能识别等技术对网站安全进行辅助检测,用正则表达式过滤非法跨站请求,实现跨站脚本攻击检测;最后,用正则表达式和Python强大的库资源编程实现了应用安全的实时检测和评估功能。实验表明:该系统在一定程度上减少了Web恶意攻击行为所带来的损失,提高了应对网页信息安全突发事件的响应速度。 With the development of the Intemet and the economic benefits derived from it, hackers have been focused on in the Web application servers, which endanger the safety of the server and the client security and is against the status quo. First of all, the Web crawler works by using breadth-first algorithms to get the target site architecture information. Second, use page dynamic parameter determination, website structure analysis, information intelligent identification technology (such as auxiliary detection), and guard the security of the website with regular expressions to filter illegal cross-site requests. Then implement cross-site scripting attack detection. Finally, with regular expressions and powerful Python library resources programming create the real-time detection and assessment of the application security ftmction. Experiments show that the system to a certain extent, reduces the loss on the Web due to malicious attacks and improves the response speed of the Web information security incidents.
出处 《信息网络安全》 2014年第1期61-64,共4页 Netinfo Security
基金 国家科技支撑计划课题[2012BAH08B02] 教育部人文社会科学项目[11YJC870011] 北京市教委科技计划面上项目[KM201211232014] 校教学改革立项项目[2012JGZD07]
关键词 篡改检测 XSS 网络爬虫 正则表达式 tamper detection XSS crawler contrast regular expressions
  • 相关文献

参考文献7

二级参考文献23

  • 1王全民,王蕊,赵钦.Linux环境下的日志分析系统LASL[J].北京工业大学学报,2005,31(4):420-422. 被引量:2
  • 2黄文,谢冬青.基于Syslog的网络日志管理分析模型[J].湖南科技学院学报,2006,27(5):164-167. 被引量:6
  • 3余慧佳,刘奕群,张敏,茹立云,马少平.基于大规模日志分析的搜索引擎用户行为分析[J].中文信息学报,2007,21(1):109-114. 被引量:117
  • 4MagnusLieHetland司维译.Python基础教程[M].北京:人民邮电出版社.2010.
  • 5MarkLutz.Python学习手册[M].北京:机械工业出版社.
  • 6[美]马特利(Martelli,A.),高铁军译.PythonCookbook[M].北京:人民邮电出版社,2010.
  • 7曹京,谭建龙,刘萍,郭莉.布尔表达式匹配问题研究[J].计算机应用研究,2007,24(9):70-72. 被引量:5
  • 8Liu Junqiang, Wang Ke. Enforcing vocabulary k-anonymity by semantic similarity based clustering [ C ]//IEEE International Conference on Data Mining, 2010:899 - 904.
  • 9He Yeye, Jeffrey F. Anonymization of set- valued data via top-down local generalization I J]. Proceedings of the VLDB Endowment, 2009,2( 1 ) :934 -935.
  • 10Hong Yuan, He Xiaoyun, Jaideep Vaidya, et al. Effective anonymization of query logs [ C ]// CIKM "09 Proceedings of the 18th ACM conference on Information and knowledge management,2009 : 1465 - 1468.

共引文献40

同被引文献39

  • 1MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 2ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 3KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 4PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 5NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 6XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between Guest OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 7WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 8Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.
  • 9TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172.
  • 10SailerR, Zhang X,Jaeger T, et al. Design and Implementation of aTCG-based Integrity Measurement Architecture[C]//USENIX SecuritySymposium. 2004,13: 223-238.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部