期刊文献+

基于Web的软件安全分析与监测 被引量:1

Security Analysis of Web Based Software
下载PDF
导出
摘要 基于Web的软件在应用中,由于Web结构的问题安全问题越来越严峻。文章对基于Web的系统结构,从安全角度分析了常见的系统问题,主要针对Web平台的认证、授权、加密及管理等方面的设置环节和常见Web攻击的场景及攻击方式对建立Web安全防御机制的需要,通过特征匹配和分块检索技术对系统进行实时监测,提供信息过滤的技术保护。文章提出了采用分片检索技术设计Web防火墙的方式和运用Simhash算法获取报文特征来提升网络防御能力。经过对Web防火墙的设计与分析,以有效的安全手段阻止了危险的侵害,并且最终通过实验证明了文章设计的安全结构的合理性和可操作性。 Security problem of Web software is more and more serious because of Web structure in its application. This paper analyzed common problems of Web system from the point o f view o f security. It established security defense mechanism towards Web platform authentication, authorization, encryption and management,carried out real-time monitoring through feature matching and block retrieval technology, providing technique protection for information filtering. Concretely,the method of designing the Web firewall by using the slice retrieval technique and the use of the Simhash algorithm to obtain the message feature to improve the network defense capability were adopted. Through the design and analysis of the Web firewall, danger of infringement can be prevented effectively and finally proved rationality and operability of security structure designed in this paper.
出处 《信息网络安全》 2016年第9期208-212,共5页 Netinfo Security
关键词 WEB安全 本体特征匹配 监测防护 Web security feature matching monitoring and defense
  • 相关文献

参考文献5

二级参考文献41

  • 1刘凯,曹剑光,谢政.在应用层次上保证Web Server的安全[J].计算机应用,2004,24(B12):45-46. 被引量:3
  • 2蔡昱,张玉清,冯登国.基于GB17859-1999标准体系的风险评估方法[J].计算机工程与应用,2005,41(12):134-137. 被引量:4
  • 3王鹃,李俊娥,刘珺.一种基于Proxy的Web应用安全漏洞检测方法及实现[J].武汉大学学报(工学版),2005,38(5):135-140. 被引量:6
  • 4孙巍,徐学东,徐学军.Java反射机制在可重构Web框架中的应用[J].计算机工程与应用,2005,41(36):92-94. 被引量:11
  • 5国家质量技术监督局.GBl7859-1999计算机信息系统安全保护等级划分准则[S].1999.
  • 6OWASP(OpenWebApplicationSecurityProject),开放式Web应用程序安全项目[EB/OL].http://www.owasp.org,2013-01-31.
  • 7CWE(CommonWeaknessEnumeration),通用缺陷列表[EB/OL].http://www.applicure.com,2013-01-31.
  • 8Hall, Mark. Web application vulnerabilities on rise[M]. Computerworld, Elsevier Inc, 2007.
  • 9Heady R, Luger G, Maccabe A, et al. The architecture of a network level intrusion detection system[R]. Technical report, Computer Science Department, University of New Mexico, August 1990.
  • 10Xydas I. Host-based web anomaly intrusion detection system, an artificial immune system approach[C]//Proceedings of the lASTED International Conference on Artificial Intelligence and Applications, 2008:258-265.

共引文献39

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部