期刊文献+

一种新的Web应用防火墙的自学习模型 被引量:8

New Model of Learning Web Application Firewall
在线阅读 下载PDF
导出
摘要 针对Web应用攻击方式繁多、传统Web应用防火墙黑名单规则库过于复杂的问题,提出一种新的Web应用防火墙的自学习模型,采用先收集、整理和归纳网页参数特征,再与用户提交数据进行规则匹配的方法,实现对Web应用的安全防护.自学习模型将Web页面参数分为类型固定参数、枚举参数和用户输入参数三类,由初始学习模块和持续学习模块组成,前者由合理样本数据建立初始规则库,后者根据用户近一段时间的输入数据持续学习网页特点,扩充用户合法行为模式,以适应用户需求变化和Web应用更新.本模型采用异常流量统计和数据包相似性分析的综合方法应对针对学习过程的攻击,进行有选择性的学习.实验结果表明此自学习模型具有良好的安全防护能力和学习能力. This paper presents a new model of learning WAF ( Web Application Firewall ) to solve the problem of various attacks and the complexity of black list. By collecting, summarizing and inducting the characteristics of web parameters, and then matching the user input with it, the model could ensure the security of Web applications. This model classifies the Web page parameters as fixed- type parameter, enumeration parameter and user-input parameter, and has two modules, initial learning module and continuous learn- ing module. The first one creates initial rule base according to the reasonable user input sample, then the latter one could continuously learn the characteristics of Web page based on the recently user input data, in order to adapt to application updates and the change of user needs. The model also introduces a comprehensive method of exceptional data flow statistic and the analysis of data similarity to learn selectively to resist the attacks which target the learning process. Experimental results has indicated that the new learning WAF has a great ability of protecting the security and learning.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第3期483-487,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61202434 61170270 61121061)资助 中央高校基本科研业务费专项(2011RC0505 2011RCZJ15 2012RC0612 2011YB01)资助
关键词 WEB安全 WEB应用防火墙 网页参数 自学习模式 web security web application f'trewall web parameter learning mode
  • 相关文献

参考文献5

二级参考文献24

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2满林松 吴亚飚.TOPSEC网络安全体系平台[EB/OL].http://www.yesky.com/20010611/183951.shtml,2000-10.
  • 3[美]Steven Holzner 陶阳 嵩敬波 王锋译.XML完全探索[M].北京:中国青年出版社,2001..
  • 4薛炳蔚 薛静锋 王勇.在安全管理中应用OPSEC[J].计算机世界报,2001-12-20(49).
  • 5MUTHUPRASANNA M, WEI K, KOTHARI S. Eliminating SQL Injection Attacks-A Transparent Defense Mechanism[C]. IEEE. Symposium on Web Site Evolution (WSE'06). Philadelphia: [s.n.], 2006 : 22-32.
  • 6ABDUL R, ALI H. Multi-layered Defense against Web Application Attacks[C]//IEEE. Sixth International Conference on Information Technology. [s.l.]: IEEE, 2009: 492-497.
  • 7ZHANG Y, SREEDHAR V. Adaptive Rule Loading and Session Control for Securing Web-Delivered Services[C]//IEEE. Proceedings of the 2009 Congress on Services-I. Los Angeles, CA: IEEE, 2009: 645-652.
  • 8ASAAD M, EANAS M. Proposing a Hybrid-intelligent Framework to Secure E-government Web Applications[C]//ACM. Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance. Cairo: IEEE, 2008: 01-03.
  • 9William G J, Viegas H J, Orso A. A Classification of SQL Injection Attacks and Countermeasures[C]//Proc. of International Symposium on Secure Software Engineering. Arlington, USA: IEEE Press. 2006.
  • 10Su Zhendong, Wassermann G. The Essence of Command Injection Attacks in Web Applications[C]//Proc. of Annual Symposium on Principles of Programming Languages. Charleston, USA: [s. n.], 2006.

共引文献95

同被引文献50

引证文献8

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部