期刊文献+

Web浏览器跨协议通信安全性研究

Study on across protocol communication security of Web browser
下载PDF
导出
摘要 阐述了浏览器跨协议通信的安全性问题,这类通信是通过将一个目标协议封装进一个载体协议中来完成的.研究表明,在满足协议有足够的容错度和有方法将目标协议封装进载体协议两个前提下,完全独立的两个协议是可以互操作的,潜在的两个不同的协议能够进行命令和数据的通信.因此跨协议通信为攻击者利用载体协议实现对目标协议的攻击提供了新的可能性,主要安全问题诸如跨协议跨站脚本、跨协议特征探测、暴力攻击. This paper explored the Inter-Protocol Communication and vulnerability. This has been investigated through encapsulating the target protocol within a carrier protocol. Http and Imap example demonstrate that under certain conditions distinct protocols were interoperable. The potential of two different protocols meaningfully communicating commands and data. Therefore Inter-Protocol Communication offers new possibilities for an attacker using a carrier protocol to attack the target protocol,such as Inter-Protocol Cross-site Scripting,Inter-Protocol Fingerprinting,Brute Force Attacks.
作者 袁梁
出处 《哈尔滨商业大学学报(自然科学版)》 CAS 2017年第4期473-476,共4页 Journal of Harbin University of Commerce:Natural Sciences Edition
关键词 浏览器 跨协议通信 HTTP IMAP 跨协议跨站脚本 browser inter-protocol communication HTTP IMAP Inter-Protocol Cross-site Scripting
  • 相关文献

参考文献4

二级参考文献74

  • 1[1]Jai Balasubramaniyan, Garcia-Fernandez Jose Omar, Isacoff David, et al. An ar chitecture for intrusion detection using autonomous agents[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 9805, 1998.
  • 2[2]Staniford-Chen S, Cheung S, Crawford R, et al. GrIDS-a graph-b ased intrusion detection system for large networks[A]. In: The 19th National Information Systems Security Conference[C].1996.http://seclab.cs.ucdavis. edu/papers/nissc96.pdf.
  • 3[3]Tung Brian. Common intrusion detection framework (CIDF)[EB/OL] . http://www.isi.edu/~brian/cidf/1999-09-10/2001-05-07.
  • 4[4]Zamboni Diego, Spafford E H. A prototype for a distributed intrusio n detection system[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 98-06,1998.
  • 5[5]Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system [J]. Journal of Computer Security,1999,7(1).http://ww w.cs.ucsb.edu/~rsg/pub/1999-vigna-kemmerer-jcs99.ps.gz.
  • 6[6]Bishop Matt, Northcutt Stephen. Executive summary[EB/OL]. http ://seclab.cs .ucdavis.edu/projects/idrds/summary.html, 1998-08-04/2001-05-07.
  • 7[7]Erlinger Michael, Staniford-Chen Stuart. Intrusion detection exchang e format (idwg)[EB/OL]. http://www.ietf.org/html.charters/idwg-chart er.html, 2001-04-30/2001-05-07.
  • 8[8]Eckmann S T, Vigna G, Kemmerer R A. STATL: an attack language for sta te-based intrusion detection[A]. In: Proc of the ACM Workshop on Int rusion Detection[C]. Athens, Greece, 2000. http://www.cs.ucsb.edu/~rsg/ pub/2000-eckmann-vigna-kemmerer-wids00.ps.gz.
  • 9[9]Vigna G, Eckmann S T, Kemmerer R A. Attack languages[A]. In: Proc of the IEEE Information Survivability Workshop[C]. Boston, MA, 2000. http://www.cs.ucsb.edu/~rsg/pub/2000-vigna-eckmann-kemmerer-attac klanguages.ps.gz.
  • 10[10]Renesse Robbert van, Minsky Yaron, Hayden Mark. A gossip-base d failure detection service[A]. In: Proc of Middleware'98[C]. England,1 998. http://www.cs.cornell.edu/Info/Projects/Spinglass/public-pdfs/Goss ip%2520Style%2520Failure.pdf.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部