期刊文献+

基于改进模糊测试的Web应用漏洞挖掘方法 被引量:2

Web Application Vulnerabilities Mining Method Based on Improved Fuzzing
下载PDF
导出
摘要 为解决Web模糊测试挖掘漏洞速度较慢、发现漏洞数较少的问题,提出一种改进的Web模糊测试向量生成方法。在通用的Web应用模糊测试结构(Web Fuzzing)基础上,分析现有测试向量生成方法,引入遗传算法来改进Web模糊测试向量生成方法。基于该方法实现XSS模糊测试工具,使用该工具对2个Web应用系统进行测试,将结果与现有模糊测试工具测试结果对比,验证了使用该方法挖掘Web漏洞速度快,发现漏洞数更多,提高了漏洞挖掘效率。 To solve the problems that slower speed and fewer number of vulnerabilities found of Web fuzzing for mining vulnerabilities,a method to improve the generation of vectors of Web fuzzing is proposed. On the basis of the structure of commonly-used fuzzing for Web application( Web fuzzing) and the analyses of the current methods of testing vectors generation,the genetic algorithm to improve testing vector generation of Web fuzzing is applied. Based on this method,a XSS fuzzing tool is implemented.The testing results of multiple Web applications with XSS fuzzing tool and that with current fuzzing tool are compared,which indicates that the efficiency of mining vulnerability is increased with the method.
出处 《计算机与现代化》 2016年第8期100-104,共5页 Computer and Modernization
关键词 WEB安全 Web漏洞 模糊测试 遗传算法 测试向量 Web security Web vulnerability fuzzing genetic algorithm test vector
  • 相关文献

参考文献15

  • 1陈衍铃,王正.模糊测试研究进展[J].计算机应用与软件,2011,28(7):291-293. 被引量:7
  • 2中国信息安全测评中心.信息安全漏洞周报[DB/OL].http ://www. cnnvd, org, cn/news/vulreport#, 2015-12-04.
  • 3Miller B P, Fredriksen L, So B. An empirical study of the reliability of Unix utilities [ J ]. Communications of the ACM, 1990,33(12) :32-44.
  • 4Hammersland R, Snekkenes E. Fuzz Testing of Web Ap- plications [ DB/OL]. http ://www. aqualab, cs. northwest- ern. edu/conferences/HotWeb08/papers/Hammersland- FTW. pdf, 2012-12-20.
  • 5Bozic J, Garn B, Kapsalis I, et al. Attack pattern-based combinatorial testing with constraints for Web security tes- ting[ C ]// Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS). 2015:207-212.
  • 6Gain B, Kapsalis I, Simos D E, et al. On the applicability of combinatorial testing to Web application security testing: A case study[ C]//Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Auto- mation and Model-based Testing. 2014:16-21.
  • 7Duchene F, Groz R, Rawat S, et al. XSS vulnerability de- tection using model inference assisted evolutionary fuzzing [ C]// Proceedings of the IEEE 5th International Confer- ence on Software Testing, Verification and Validation. 2012:815-817.
  • 8李彤,黄轩,刘海燕,黄睿.基于Fuzzing的软件漏洞发掘技术[J].价值工程,2014,33(3):197-199. 被引量:1
  • 9Hydara I, Sultan A B M, Zulzalil H, et al. An approach for cross-site scripting detection and removal based on ge- netic algorithms[ C ]/! Proceedings of the 9th International Conference on Software Engineering Advances. 2014:227- 232.
  • 10边霞,米良.遗传算法理论及其应用研究进展[J].计算机应用研究,2010,27(7):2425-2429. 被引量:226

二级参考文献140

共引文献231

同被引文献15

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部