期刊文献+

基于EBNF和二次爬取策略的XSS漏洞检测技术 被引量:9

XSS vulnerability detection technology based on EBNF and twice crawling strategy
下载PDF
导出
摘要 跨站脚本(XSS)攻击是目前互联网安全的最大威胁之一。针对传统基于渗透测试技术的漏洞检测方法中攻击向量复杂度低易被过滤、整体检测流程繁琐等问题,提出了一种基于扩展的巴科斯范式(EBNF)的攻击向量自动生成方法和XSS漏洞二次爬取策略。通过定义EBNF规则生成规则解析树,按层次遍历获得高复杂度攻击向量。在首次爬取页面时,将输入点信息嵌入到攻击向量后请求注入,之后进行二次爬取,请求合法参数获得返回页面。最后设计实现了原型系统,并使用两个平台进行漏洞检测。通过对比实验证明,该系统检测流程简单,在一定程度上提高了漏洞检测数,降低了漏洞误报率。 Cross-site scripting (XSS) attacks have been one of the biggest threats to Internet security. Aiming at the problems of traditional vulnerability detection method based on penetration testing technology, such as attack vectors of low complexity easy to filter and overall detection process cumbersome, this paper proposed a new attack vectors automatic generation method which based on extended Backus-naur form (EBNF) and a XSS vulnerability twice crawling strategy. By defining the EBNF rule, the method generated a rule-parsing tree, and then it traversed hierarchically the tree to obtain high-complexity attack vectors. In the first page crawling, the strategy inserted input point information to attack vectors and requested injection. Then it carried on the second crawling and requested legal parameters to get the return page. In the final, this paper designed and implemented a prototype system, and used two platforms for vulnerability detection. The comparative experiments prove that the system has a simple detection process, and to a certain extent, it improves the number of vulnerability detection and reduces the false positive rate.
作者 黄文锋 李晓伟 霍占强 Huang Wenfeng;Li Xiaowei;Huo Zhanqiang(Henan Provincial Institute of Scientific & Technical Information,Zhengzhou 450003,China;College of Computer Science & Technology,Henan Polytechnic University,Jiaozuo Henan 454000,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第8期2458-2463,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61472342,61572379) 河南省高等学校重点科研计划项目(17A520007)
关键词 跨站脚本 扩展的巴科斯范式 攻击向量 渗透测试 XSS EBNF attack vector penetration testing
  • 相关文献

参考文献5

二级参考文献46

  • 1杨学兵,张俊.决策树算法及其核心技术[J].计算机技术与发展,2007,17(1):43-45. 被引量:84
  • 2Johns M, Engelmann B, Posegga J. XSSDS: server-side detection of cross-site scripting attacks[C-I,//Proceedings of Computer Security Applications Conference. IS. 1. ] : IEEE, 2008..335 - 344.
  • 3Klein A. DOM based cross site scripting or XSS of the third kind[-JT. Web Application Security Consortium, 2005,4:59 - 64.
  • 4Jovanovic N, Kruegel C, Kirda E. Pixy.. a static analysis tool for detecting Web application vulnerabilities [J-]. IEEE, 2006,126..258-263.
  • 5Artzi S, Kiezun A, Dolby J, et al. Finding bugs in dynamic web applications E C ff Proceedings of the 2008 International Symposium on Software Testing and Analysis. [-S. 1. 1: ACM, 2008:261 -272.
  • 6Vogt P, Nentwich F, Jovanovic N, et al. Cross site scripting prevention with dynamic data tainting and static analysis[C]//Proceedings of the Network and Dis- tributed System Security Symposium (NDSS). New York, USA..[s. n. ], 2007..95 - 102.
  • 7Tang Zhushou, Zhu Haojin, Cao Zhenfu, et al. LWMxD: lexical based webmail XSS discoverer[,C] ff Proceedings of the First International Workshop on Security in Computers, Networking and Commu- nications. [-S. 1. ] : IEEE, 2008:976 - 981.
  • 8Ismail O, Etoh M, Kadobayashi Y. A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability [-C3 // Proceedings of the 18th International Conference on Advanced Information Networking and Applications. Washington, D.C. , USA: IEEE. 2004,129 - 136.
  • 9钟晨鸣,徐少培.Web前端黑客技术揭秘[M].北京:电子工业出版社,2013.
  • 10OWASP. Category : OWASP TopTen Project[ EB/OL] . https;//www.owasp. org/index. php/Category : OWASP _ Top _ Ten _ Project 2013 ,6,12.

共引文献30

同被引文献50

引证文献9

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部