期刊文献+

基于二阶分片重组盲注的渗透测试方法

Penetration test method using blind SQL injection based on second-order fragment and reassembly
下载PDF
导出
摘要 针对如何克服当前SQL注入渗透测试存在的盲目性,以生成优化的SQL注入攻击模式、增强渗透测试攻击生成阶段的有效性,提高对SQL注入渗透测试的准确度问题,提出一种基于二阶分片重组的SQL盲注漏洞渗透测试方法。该方法通过对SQL注入攻击行为进行建模,并以模型驱动渗透测试多形态和多种类的攻击生成,从而降低SQL注入渗透测试盲目性,提高其准确度。通过实际的Web应用SQL注入漏洞测试实验与比较分析,不仅验证了所提方法的有效性,而且通过减少在安全防御环境下对SQL注入漏洞检测的漏报,提高其测试的准确度。 How to get rid of the blindness of current SQL injection penetration test, produce the optimized attack pattern of SQL injection, enhance the effectiveness in the phase of attack generation, and improve the accuracy of vulnerability detection of SQL injection using penetration test, is a big challenge. In order to resolve these problems, a new penetration test method using blind SQL injection was proposed based on second-order fragment and reassembly. In this method, the SQL injection attack model was built firstly and then the multiform and multi-type attack patterns of SQL injection pene-tration test driven by the SQL injection attack model was produced, which can reduce the blindness of SQL injection pe-netration test and improve the accuracy of SQL injection vulnerability detection. The experiments of SQL injection vul-nerability detection was conducted through the actual Web applications by using proposed method in comparison with current methods. The analysis results of test show the proposed method is better compared with other methods, which not only proves the effectiveness of proposed method, but also improve the accuracy of SQL injection vulnerability detection by reducing false negative in the defensive environment.
出处 《通信学报》 EI CSCD 北大核心 2017年第A01期73-82,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.61402057) 江苏省产学研前瞻性联合研究基金资助项目(No.BY2016050-01) 江苏省科技计划基金资助项目(No.BK20160411)~~
关键词 SQL注入 渗透测试 攻击模型 二阶分片重组 SQL injection, penetration test, attack model, second-order fragment and reassembly
  • 相关文献

参考文献2

二级参考文献35

  • 1王文明,李海炜.SQL服务器注入攻击的主动防御技术研究[J].计算机科学,2012,39(S3):9-13. 被引量:3
  • 2Bau J,Bursztein E, Gupta D,et al. State of the art: au-tomated black-box web application vulnerability testing.In: Proceedings of the 2010 IEEE Symposium on Securityand Privacy, Oakland, USA, 2010. 332-345.
  • 3Doup'e A, Cova M, Vigna Gi. Why johnny can’t pen-test: an analysis of black-box web vulnerability scanners.In: Proceedings of the 7th GI International Conference onDetection of Intrusions and Malware and Vulnerability As-sessment ,Bonn, Germany, 2010. 111-131.
  • 4Antunes J,Neves N,Correia M,et al. Vulnerability dis-covery with attack injection. IEEE Transactions on Soft-ware Engineering, 2010,36(3). :357-369.
  • 5Halford W, Choudhary S, Orso A. Improving penetrationtesting through static and dynamic analysis. In: Proceed-ings of the 2nd IEEE International Conference on SoftwareTesting, Verification and Validation, West Sussex, UK,2011.195-214.
  • 6Antunes N, Laranjeiro N, Vieira M, et al. Effective de-tection of SQL/XPath injection vulnerabilities in webservices. In: Proceedings of the IEEE International Con-ference on Services Computing, Bangalore, India, 2009.260-267.
  • 7Fong E,Gaucher R,Okun V, et al. Building a test suitefor web application scanners. In: Proceedings of AnnualHawaii International Conference on System Sciences, Ha-waii, USA, 2008. 479486.
  • 8Byers D, Shahmehri N. Unified modeling of attacks, vul-nerabilities and security activities. In: Proceedings of2010 ICSE Workshop on Software Engineering for SecureSystems, New York, USA, 2010. 3642.
  • 9Wang J, Phan R C,John N, et al. Augmented attack treemodeling of SQL injection attacks. In: Proceedings of the2nd IEEE International Conference on Information Man-agement and Engineering, Chengdu, China,2010. 182-186.
  • 10Marback A, Do H, He K, et al. Security test generationusing threat trees. In: Proceedings of ICSE Workshop onAutomation of Software Test, Vancouver, Canada, 2009.62-69.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部