期刊文献+

一种基于动态污点分析的注入式攻击检测模型的设计与实现

下载PDF
导出
摘要 在已发现的Web攻击类型中,注入式攻击发生频率最高,研究一种高准确率且高效的检测模型来应对频繁的注入式攻击,具有重要的理论意义和实际价值。设计一种动态污点分析的注入式攻击检测系统,通过动态污点分析提取攻击向量,基于语法分析技术将扁平的字符串抽象画,使用卷积神经网络模型和优化的FastText分类模型建立SQL注入攻击和恶意代码注入攻击模型,从而准确有效地检测出注入式攻击的目的。
出处 《技术与市场》 2022年第2期102-103,共2页 Technology and Market
  • 相关文献

参考文献3

二级参考文献40

  • 1Vcnkataramani G, Doudalis I, Solihin Y, Prvulovic M. FlexiTaint: A programmable accelerator for dynamic taint propagation. In: Carter J, ed. Proc. of the 14th Int'l Syrup. on High Performance Computer Architecture (HPCA). New York: ACM Press, 2008. 173-184. Idol: 10.1109/HPCA.2008.46S8637].
  • 2Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Harder E, ed. Prec. of the Network and Distributed System Security Syrup. (NDSS 2005). San Diego: National Security Agency Press, 2005. 187-204.
  • 3CVE terminology page. 2009. http://www.cve.mitre.org/about/terminology.html#vulnerability.
  • 4Sekar R. An efficient black-box technique for defeating Web application attacks. In: Vigna G, ed. Proc. of the Network and Distributed System Security Syrup. (NDSS 2009). San Diego: National Security Agency Press, 2009.23-39.
  • 5CVE and CCE statistics query page. 2009. http://web.nvd.nist.gov/view/vuln/statistics?execution=e 1 s 1.
  • 6Open Web Application Security Project (OWASP). The ten most critical Web application security vulnerabilities. 2007. http://www.owasp.org/images/e/e8/OWASP_ Top_ 10 _2007.pdf.
  • 7Lam MS, Martin MC, Livshits VB, Whaley J. Securing Web applications with static and dynamic information flow tracking. In: Hatcliff J, ed. Proc. of the 2008 ACM SIGPLAN Symp. on Partial Evaluation and Semantics-based Program Manipulation. New York: ACM Press, 2008.3-12. [doi: 10.1145/1328408.1328410].
  • 8Xie YC, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. In: Paakki J, ed. Proc. of the 9th European Software Engineering Conf. Held Jointly with 1 lth ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering. New York: ACM Press, 2003. 327-336. [doi: 10.1145/940071.940115].
  • 9Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 116-127. [doi: 10.1145/1315245.1315261].
  • 10Sabelfeld A, Myers AC. Language-Based information-flow security. IEEE Journal on Selected Areas in Communications, 2003, 21(1):5-19. [doi: 10.1109/JSAC.2002.806121].

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部