期刊文献+

Web应用防火墙的设计与实现 被引量:15

Design and Implementation of Web Application Firewall
原文传递
导出
摘要 大部分Web应用都存在安全漏洞从而为攻击者提供了一扇攻击的大门,并且传统安全设备如网络防火墙、入侵检测系统只能保护开放系统互连(OSI)参考模型的较低层,并不能有效防御应用层的攻击。在分析了主流的Web应用层的攻击方法后提出一个Web应用防火墙的整个实现架构和一些过滤策略。Web应用防火墙用Python实现,经测试,可以有效地阻止各种恶意的攻击,如SQL注入、跨站脚本攻击和应用层拒绝服务攻击。 Most Web applications contain security vulnerabilities and open a door to attackers.Moreover,the traditional security software,like intrusion detection system or firewall,could only protect the lower layer of OSI model,but fail to avoid Web application layer attack.Based on analysis of the mainstream hacking skills against the Web application layer,this paper presents design of the architecture and some filtering policies for an Web application firewall.The firewall is implemented with python,and the experimental results show that the firewall could block the malicious attacks,including SQL injection,XSS,application layer DDoS.
作者 王宇 陆松年
出处 《信息安全与通信保密》 2011年第5期104-106,共3页 Information Security and Communications Privacy
关键词 WEB应用防火墙 SQL注入 跨站攻击 应用层拒绝服务攻击 Web application firewall SQL injection XSS application layer DDoS
  • 相关文献

参考文献5

  • 1MUTHUPRASANNA M, WEI K, KOTHARI S. Eliminating SQL Injection Attacks-A Transparent Defense Mechanism[C]. IEEE. Symposium on Web Site Evolution (WSE'06). Philadelphia: [s.n.], 2006 : 22-32.
  • 2陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 3ABDUL R, ALI H. Multi-layered Defense against Web Application Attacks[C]//IEEE. Sixth International Conference on Information Technology. [s.l.]: IEEE, 2009: 492-497.
  • 4ZHANG Y, SREEDHAR V. Adaptive Rule Loading and Session Control for Securing Web-Delivered Services[C]//IEEE. Proceedings of the 2009 Congress on Services-I. Los Angeles, CA: IEEE, 2009: 645-652.
  • 5ASAAD M, EANAS M. Proposing a Hybrid-intelligent Framework to Secure E-government Web Applications[C]//ACM. Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance. Cairo: IEEE, 2008: 01-03.

共引文献17

同被引文献62

  • 1种灵子,杨木清,焦忭忭.一种检测DDoS攻击主控端的方法[J].信息安全与通信保密,2008(2):68-69. 被引量:2
  • 2王霜,修保新,肖卫东.Web服务器集群的负载均衡算法研究[J].计算机工程与应用,2004,40(25):78-80. 被引量:46
  • 3陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 4EHAB S AI-Shaer, HAZEM H Hamed. Design and Emplementation of Firewall Policy Advisor Tools[J]. IEEE lournals, 2005, 10(23): 2069-2084.
  • 5RAO Prathima, GABRIEL Ghinita, ELISA Bertino. Visualization for Access Control Policy Analysis Results Using Multi-level Grids[J]. IEEE Transactions on Knowledge and Data Engineering, 2009(9) : 25-28.
  • 6TUNG Tran, EHAB A1-Shaer, RAOUF Boutaba. PolicyVis : Firewall Security Policy Visualization and Inspection[R]. Canada: [s.n.], 2007: 1-16.
  • 7ROBERT W Reeder, LUJO Bauer, LORRIE Faith Cranor. Expandable Grids for Visualizing and AuthoRing Computer Security Policies[J]. IEEE Transactions on Knowledge and Data Engineering, 2008(2): 1473-1482.
  • 8KAMI Vaniea, Ni Qun, LORRIE Cranor. Access Control Policy Analysis and Visualization Tools for Security Professionals[J]. IEEE Transactions on Software Engineering, 2009(1): 1-6.
  • 9SCOTT Hazelhurst, ANTON Fatti, HENWOOD Andrew. Binary Decision Diagram Representations of Firewall and Router Access Lists[J]. International Journal of Computer Science andApplications, 1998(1): 1-11.
  • 10John Whaley. JavaBDD[EB/OL]. (2007-10-29)[2011-12- 21]. http: //javabdd.sourceforge.net.

引证文献15

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部