期刊文献+

Web应用SQL注入漏洞检测工具的设计与实现 被引量:3

Design and Implementation of SQL Injection Detection System based on Web Application
下载PDF
导出
摘要 由于Web应用系统的开发周期较短,同时开发人员安全编程意识不足,Web应用程序会存在漏洞。因此,检测Web应用系统的安全性是安全领域的亟待解决的问题。SQL注入漏洞检测工具模拟黑客攻击的方式,采用网络爬虫技术建立需检测的URL库,依据SQL注入模板精心构造URL,并从根据浏览器返回信息,判定是否存在SQL注入点。可以提前意识到Web应用存在的漏洞,并及时修补,降低系统受攻击的风险,是有效的Web安全防护手段。 Web application development cycle is very short, and programmers lack the awareness of security programming, loopholes in Web applications are inevitable. So how to detect and assess security of Web applications is a serious problem of Web security. SQL Injection Detection System simulates the way that hacker at acks to send specific vulnerability characteristics. This tool can create URL library using the web crawler technology, and construct URL careful y based on SQL injection template. According to the response of browser, determine the existence of SQL injection. Users can aware of Web application vulnerabilities early, and repair them timely. As a result the risk of at ack system is reduced and it is the ef ective method to protect Web security.
出处 《信息安全与技术》 2014年第8期45-47,57,共4页
基金 河南省科技计划项目(142300410108) 河南省教育厅科学技术研究重点项目基础研究(14A520056) 南阳师范学院校级项目(QN2013047)
关键词 SQL注入 漏洞检测 WEB安全 sql injection vulnerability scanning web application security
  • 相关文献

参考文献5

二级参考文献39

  • 1黄景文.SQL注入攻击的一个新的防范策略[J].微计算机信息,2008,24(6):74-75. 被引量:11
  • 2马国峰.SQL注入攻击与防范[J].三门峡职业技术学院学报,2008,7(1):122-124. 被引量:3
  • 3戴诗发.校园网SQL注入攻击与防范技术研究[J].昆明理工大学学报(理工版),2005,30(3):72-75. 被引量:13
  • 4陈小兵,张汉煜,骆力明,黄河.SQL注入攻击及其防范检测技术研究[J].计算机工程与应用,2007,43(11):150-152. 被引量:72
  • 5National Vulnerability Database.National vulnerability database(NVD) CVE statistics[EB/OL].(2009-12).http://web.nvd.nist.gov/view/vuln/statistics-results?cid=4.
  • 6OWASP.Top 10 2007[EB/OL].(2009-11).http://www.owasp.org/index.php/Top_10_2007.
  • 7BANDHAKAVI S,BISHT P,MADHUSUDAN P,et al.CANDID:preventing SQL injection attacks using dynamic candidate evaluations[C] //Proc of the 14th ACM Conference on Computer and Communications Secirity.New York:ACM Press,2007:12-24.
  • 8FRIEDL J E F.Mastering regular expressions[M].2nd ed.[S.l.] :O'Reilly Media Inc,2005:10-21.
  • 9PESSOA J.Detecting SQL injection vulnerabilities in Web services[C] //Proc of the 4th Latin-American Symposium on Dependable Computing.Joao Pessoa,Brazil:IEEE Computer Society,2009:17-24.
  • 10KEMALIS K,TZOURAMANIS T.SQL-IDS:a specification-based approach for SQL-injection detection[C] //Proc of ACM Symposium on Applied Computing.New York:ACM Press,2008:2153-2158.

共引文献139

同被引文献19

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部