期刊文献+

基于特征集合的XSS漏洞安全研究 被引量:4

Security Research on XSS Vulnerability Based on Feature Set
下载PDF
导出
摘要 跨站脚本XSS是Web安全的主要威胁。在分析网页爬虫的爬取流程基础上,提出一种网络爬虫架构,根据特征集合对爬取的网页资源进行XSS漏洞分析。通过Java和Python环境下的实验测试,该爬虫架构能爬取到页面的细小方面,使用特征提取能够进行有效的识别。 XSS is a major threat to the Web security. After analyzed crawling process of Web crawler, a Web crawler architecture is proposed and the XSS vulnerability- of crawling Web resources is analyzed according to the feature set. The results of experimental under the Java and Python environment show that the crawler architecture can crawl to the small aspects of the Web page, and can be effectively identified by using feature extraction.
作者 齐晓霞 丁黄法 王琦进 QI Xiaoxia;DING Huangfa;WANG Qijin(College of lnformation Engbwering,Anhui Xinhua University,Hefei 230088 China)
出处 《西华大学学报(自然科学版)》 CAS 2018年第6期37-41,共5页 Journal of Xihua University:Natural Science Edition
基金 安徽省高等学校自然科学研究重点项目(KJ2016A311) 安徽省高等学校自然科学研究重点项目(KJ2018A0589)
关键词 XSS Web检测 网页爬虫 特征集合 XSS Web detection Web crawler feature set
  • 相关文献

参考文献4

二级参考文献30

  • 1OWASP Testing Guide 2007 V2[Z].(2007-01-01).http://www.owasp.org/index.php/Category:OWASP_Testing_Project#OWASP_Testing_Guide_v2.
  • 2Offutt J,Wu Ye,Du Xiaochen,et al.Bypass Testing of Web Applica-tions[C]//Proc.of ISSRE'04.[S.l.]:IEEE Computer Society,2004.
  • 3Flash Parameter Injection[Z].(2008-09-24).http://blog.watchfire.com/FPI.pdf.
  • 4王功明,吴华瑞,赵春江,杨宝祝.正则表达式在电子政务客户端校验中的应用[J].计算机工程,2007,33(9):269-271. 被引量:16
  • 5OWASP top ten project for 2010 [EB/OL]. [-2010-04-19]. http://www, owasp, org.
  • 6Kirda E, Jovanovic N. Client-side cross-site scripting protection [J]. Computers & Security, 2009, 28 (7): 592-604.
  • 7Saxena P, Song D. Document structure integrity: A robust basis for cross-site scripting defense [C] //San Diego, USA: 16th Annual Network & Distributed System Security Symposium, 2009.
  • 8Louw M T, Venkatakrishnan V N. BluePrint: Robust prevention of cross-site scripting attacks for existing browsers [C]// Oakland, USA: 30th IEEE Symposium on Security and Privacy, 2009: 331-346.
  • 9Gulwani S, Tiwari A. Constraint-based approach for analysis of hybrid systems [G]. LNCS 5123: Computer Aided Verification, 2008: 190-203.
  • 10Russo A, Sabelfeld A, Dynamic VS. Static flow-sensitive security analysis [C] //Edinburgh, UK.. 23rd Computer Security Foundations Symposium, 2010: 186-199.

共引文献25

同被引文献34

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部