期刊文献+

基于Akast的XSS网络渗透攻击研究

Research on XSS network penetration attack based on Akast
下载PDF
导出
摘要 文章针对黑客最新的Akast XSS渗透攻击手段,利用Web站点文本交互,嵌入诱导攻击于文字代码,成功躲避信息安全防范攻击;列举了获取后台系统信息过程;提出了不同环境下的防范方法,警示系统漏洞危害和Web站点安全。 Aiming at the latest akast XSS penetration attack method of hackers, this paper uses Website text interaction to embed and induce attacks on text code, successfully avoiding information security defense attacks;lists the process of obtaining background system information;puts forward prevention methods under different environments, warning system vulnerability hazards and Website security.
作者 涂传唐 Tu Chuantang(Guangdong Polytechnic of Science and Trade,Guangzhou 510430,China)
出处 《无线互联科技》 2020年第5期21-22,共2页 Wireless Internet Technology
关键词 Akast 跨站脚本渗透 网络攻击 信息安全 黑客 Akast cross-site script penetration network attack information security hacker
  • 相关文献

参考文献2

二级参考文献15

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2上海云盾信息技术有限公司.云盾关于渗透攻击定义[EB/OL].[2014-11-15].https://www.yundun.cn/help/78.html.
  • 3Bruce Schneier. Attack trees: Modeling security threats[EB/OL]. [2014-11-153. http://www.schneier.com/paper- attacktrees-ddj-ft.html.
  • 4Swiler L P, Philips C, Gaylor T. A graph-based newtwork-vulnerability analysis system[R]. Livermore, Califor- nia, USA: Sandia National Laboratories, 1998.
  • 5Swiler L P, Phillips C, Gaylor T. A Graph-Baseed Network-Vulnerability Analysis System[EB/OL]. [2014-11- 161. http://web2.utc.edu/~djy471/CPSC4660/graph-vulnerability.pdf.
  • 6Jha S, Sheyner O, Wing J. Two formal analyses of attack graphs[C/OL]//15th IEEE Computer Security Foun- dations Workshop, Cape Breton, NS, Canada, June 24-26, 2002. [2014- 11- 16]. http://ieeexplore.ieee.org/ stamp/stamp.jsp?tp=&amumber= 1021806.
  • 7Ammann P, Wijesekera D, Kaushik S. Scalable, Graph-based network vulnerability analysis[C/OL]. ACM Conference on Computer and Comm inications Security, Washington, DC, USA, November 18-22, 2002. [2014-11-17]. http: //dl.acm.org/citation.cfm?id=586140g>CFID=603913220~CFTOKEN=49808965.
  • 8Moore A P, Ellison R J, Linger R C. Attack Modeling for Informaiton Security and Survivability[EB/OL]. [2014-11-16]. http:/ /resources.sei.cmu.edu/library / asset-view.cfm ? assetid=5417.
  • 9US-CERT. CVE(Common Vulnerabilities and Exposures)[EB/OL]. [2014-11-17]. http://cve.mitre.org/about/in- dex.html.
  • 10张殷乾,王轶骏,薛质.攻击文法与攻击图模型的对比[J].辽宁工程技术大学学报(自然科学版),2008,27(6):899-902. 被引量:2

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部