期刊文献+

SQL注入攻击与防范实验的设计与实现 被引量:6

Design and Implementation of Experiments for SQL Inject Attack and Prevention
下载PDF
导出
摘要 介绍了SQL注入的原理、攻击和防范技术,并通过设计具体实验方案演示了SQL注入攻击与防范的全过程及细节。通过搭建存在SQL注入漏洞的Web网站并对其进行SQL注入攻击,观察被攻击的效果,进行漏洞修复。对漏洞修复后的系统进行攻击,并对比修复漏洞前后的现象,以此得出SQL注入漏洞的原理、产生原因、对应攻击原理及如何防范漏洞,加深对SQL注入的理解。 This paper introduces the principle, attack and prevention technology of SQL injection, and demonstrates the whole process and details of SQL injection attack and prevention by designing a concrete experimental scheme. By building a web site with SQL injection vulnerabilities and using SQL injection attacks, we observe the effects of the attack, and then repair the vulnerabilities. The system after bug fixes is also attacked, and is compared with the phenomena before the repair of the loophole. This shows the principles and causes of SQL injection vulnerabilities, the principles of corresponding attacks and how to prevent loopholes, so as to enhance the understanding of SQL injection.
作者 王德高 徐王楚 王立明 刘向东 WANG De-gao;XU Wang-chu;WANG Li-ming;LIU Xiang-dong(School of Computer Science and Engineering,Dalian Minzu University,Dalian Liaoning 116650,China)
出处 《大连民族大学学报》 2019年第5期441-444,共4页 Journal of Dalian Minzu University
基金 辽宁省本科教育教学改革项目(2015-667) 辽宁省应用型转型发展试点专业建设项目(2016-70) 大连民族大学教育教学改革项目(ZB201902,ZD201910)
关键词 SQL注入 WEB攻击 漏洞修复 网络安全 SQL inject Web attack bug fixes network security
  • 相关文献

参考文献9

二级参考文献60

  • 1韩臻,韩磊,马威.美国国家网络空间安全教育计划探析[J].保密科学技术,2012(7):44-49. 被引量:10
  • 2Cesar Cerrudo.Manipulating microsoft SQL ser-ver using SQL injecti on.[EB/OL].http://www.appsecinc.com/presentations/Manipulat- ing_SQL_Server _using _SQL_Injection.pdf.2004-3-25.
  • 3SPI LABS.SQL Injection[EB/OL]. http://www.spidynamics.com/pa pers/SQL Injection WhitePaper.pdf.2004-3-25.
  • 4ANSI.DIS 90751992,Information technology - Database language SQL[S] .
  • 5ISO/IEC.ISO/IEC 9075:1992.Information technology - Database language SQL[S].
  • 6ISO/IEC.ISO/IEC 9075-5:1999.Information technology - Database language SQL[S].
  • 7WebCohort.WebCohort;s application defense center reports results of vulnerabil ity testing on Web applications.[EB/OL].http://www.imperva.com/com pany/news/2004-feb-02.html.2004-3-25.
  • 8Stephen Kost.An Introduction to SQL injection attacks for Oracle developers.[EB/OL].http://www.integrigy.com/papers.htm.200 4-3-25.
  • 9Chris Anley.Advanced SQL injection in SQL server applications.[EB/OL].http://www.nextgenss.com/research.html,2004-3-25.
  • 10Ofer Maor,Amichai Shulman.Blindfolded SQL injection.[EB/OL].http://www.im perva.com/application_defense_center/white_papers/blind_sql_s erver_injection.html.2004-3-25.

共引文献121

同被引文献26

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部