期刊文献+

基于Fuzzing技术提升XSS漏洞防御水平的研究 被引量:2

Design on enhancement of XSS vulnerability detection capabilities based on fuzzing technology
下载PDF
导出
摘要 面对高交互性、高复杂性的网络操作过程,有效提升对XSS漏洞的检测、防御能力有利于提高Web安全。本文提出了一种主动提升对XSS漏洞的检测与防御能力的方法,该方法通过网络爬虫爬取Web交互页面,结合XSS漏洞的特征,基于Fuzzing技术主动挖掘潜在漏洞,利用渗透工具模拟攻击并捕获网络攻击流量,提取攻击特征,最终结合Snort防御告警主动提升Web安全。实验测试表明,该方法可有效检测XSS漏洞,结合对Snort规则库的补充升级,能够有效提升对XSS漏洞的防御能力。 Surrounding with all kinds of network operation processes of high interaction and high complexity, the effective prevention and detection of Cross-site scripting (XSS) vulnerability favour the improvement in Web security. The paper describes a method of using Crawler's technology to download the content of Interactive page, dig vulnerability with Fuzzing technology, and then to capture network attacks, extract features from the attacks, and at last enhancing the ability of Snort to prevention and detection of XSS vulnerability. We also verify the method with actual experienment, finally the result of the experiment verifies that the method using certain snort and it's effective to improve the detection capabilities. fuzzing test inputs can upgrade the rules of
出处 《电子设计工程》 2017年第5期33-36,41,共5页 Electronic Design Engineering
关键词 FUZZING技术 XSS漏洞 渗透攻击 特征提取 Fuzzing technology Crawler's technology penetration attacks feature extraction
  • 相关文献

参考文献5

二级参考文献35

  • 1康宏,沈西挺.Windows平台的Snort入侵检测系统[J].兵工自动化,2005,24(2):41-42. 被引量:3
  • 2吴玉.构建基于Snort的入侵检测系统[J].微电子学与计算机,2005,22(7):165-167. 被引量:13
  • 3高平利,任金昌.基于Snort入侵检测系统的分析与实现[J].计算机应用与软件,2006,23(8):134-135. 被引量:24
  • 4Fumio Mizoguchi.Anomaly Detection Using Visualization and Machine Learning[C].In:IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterpfises,Gaithersburg, Maryland, 2000-03.
  • 5SHAN Zheng,CHEN Peng,XU Ke et al.A Network State Based In trusion Detection Model[C].In:2001 International Conference on Computer Networks and Mobile Computing.Beijing, CHINA, 2001- 10.
  • 6Koral Ilgun,Richard A Kemmerer,Phillip A Porras.State Transition Analysls:A Rule-Based Intrusion Detection Approach[J].IEEE Transactions on Software Engineering, 1995 ;21 (3) : 181-199.
  • 7Nittida Nuansri ,Samar Singh ,Tharam S Dillon.A Process State-Transition Analysis and its Application to Intrusion Detection[C].In: 15th Annual Computer Security Applications Conference,Phoenix, Arizona, 1999-12.
  • 8Nong Ye, Syed Masum Emran, Xiangyang Li et al.Statistical Process Control for Computer Intrusion Detection[C].In:DARPA Information Survivability Conference & Exposition Anaheim,California,2001;1(1).
  • 9康正勇.网络入侵检测系统Snort的研究与改进[D].西安:西安电子科技大学,2006:15-19.
  • 10Johns M, Engelmann B, Posegga J. XSSDS: server-side detection of cross-site scripting attacks[C-I,//Proceedings of Computer Security Applications Conference. IS. 1. ] : IEEE, 2008..335 - 344.

共引文献33

同被引文献21

引证文献2

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部