期刊文献+

基于攻击反馈模型的SQL注入漏洞渗透测试方法 被引量:2

SQL INJECTION VULNERABILITY PENETRATION TEST APPROACH BASED ON ATTACKING FEEDBACK MODEL
下载PDF
导出
摘要 针对SQL注入漏洞测试过程中准确度和效率不足以及其之间的竞争问题,提出一种基于攻击反馈模型(Attacking Feedback Model,AFM)的SQL注入漏洞渗透测试方法。该方法在梳理SQL注入攻击反馈分析技术的基础上,基于典型的SQL注入攻击逻辑及其攻击树构建多种攻击反馈测试单元,以及一系列由这些测试单元构成的测试阶段,通过自底向上的反馈信息流实现一种启发式的动态测试方法。该文实现了一个原型系统,并在预先植入漏洞的目标漏洞系统上与两个知名渗透测试工具进行对比实验,结果显示文章所述方法能有效提高SQL注入漏洞渗透测试的准确度和检测效率。 Aimed at the problem of insufficient accuracy and efficiency in the process of SQL injection vulnerability test and the competition problem between them,an approach of SQL injection vulnerability penetration test based on AFM(attacking feedback model)is proposed.Based on the analysis of SQL injection attack feedback techniques,this approach constructed a variety of attacking feedback test units and a series of test stages composed of these test units based on the typical SQL injection attack logic and attack tree.This approach realized a heuristic dynamic test method through a bottom to up feedback information flow mechanism.A prototype system was implemented,and the experimental comparison and analysis with two well-known penetration testing tools was carried out on a target vulnerability system with pre-implanted vulnerabilities.The results show that the proposed method can effectively improve the test accuracy and detection efficiency of SQL injection vulnerability penetration test.
作者 刘磊 许静 朱静雯 陈亮 李洁 Liu Lei;Xu Jing;Zhu Jingwen;Chen Liang;Li Jie(College of Artificial Intelligence,Nankai University,Tianjin 300350,China;College of Software,Nankai University,Tianjin 300350,China;Electric Power Research Institute,State Grid Tianjin Electric Power Company,Tianjin 300384,China)
出处 《计算机应用与软件》 北大核心 2023年第6期323-329,共7页 Computer Applications and Software
基金 国家电网公司总部科技项目(SGTJDK00DWJS1900105)。
关键词 Web系统漏洞 渗透测试 SQL注入 攻击树模型 Web system vulnerability Penetration test SQL injection Attacking tree model
  • 相关文献

参考文献6

二级参考文献31

  • 1廖晓勇,连一峰,戴英侠.网络安全检测的攻击树模型研究[J].计算机工程与应用,2005,41(34):108-110. 被引量:4
  • 2周伟,王丽娜,张焕国.一种基于树结构的网络渗透测试系统[J].计算机与数字工程,2006,34(12):15-18. 被引量:5
  • 3周晓俊,刘向东.网络渗透测试技术研究[J].计算机安全,2007,24(4):285-288.
  • 4Schneier, Bruce. Attack trees[J]. Dr. Dobb's Jour- nal of Software Tools., 1999,24 (12) .- 21-29.
  • 5J Lucangeli, C Sarraute, G Richarte. Attack plan- ning in the real world[C]// Workshop on Intelli- gent Security, 2010.
  • 6Kevin P Haubris, Joshua J Pauli. Improving the Ef- ficiency and Effectiveness of Penetration Test Auto- mationFC]//2013 10th International Conference on Information Technology, 2013.
  • 7Bruce Sehncier. Secrets and Lies:Digital security in a networked world[J]. John Wiley I~ Sons, 2000, 34 : 521-526.
  • 8Cynthia Phillips, Laura Swiler. A graph-based sys- tem for network-vulnerability analysis[J]. ACM, 1998..71-79.
  • 9M Gunter, T Braun. Internet service monitoring with mobile agents [J]. IEEE Network, 2002, 16 (3) :22-29.
  • 10Lu Shen, Xiao Yan Liang, Yang Bo, et al. Auto- matic Generation for Penetration Testing Scheme Analysis Model for Network[-C']//2011 Computa- tional and Information Sciences (ICCIS),2011.

共引文献48

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部