期刊文献+

基于Web的SQL注入漏洞扫描系统的设计研究 被引量:5

Design and research of SQL injection vulnerability scanning system based on Web
在线阅读 下载PDF
导出
摘要 对于现代SQL注入检测大部分都是将语法分析策略为基础,但是此种策略检测的效率较低,并且还存在漏洞扫描不完善的问题,实现基于Web的SQL注入漏洞扫描系统的设计。对SQL注入漏洞给相应检测及防御技术进行研究,通过本地创建的实验环境,将Pubs数据库作为案例和多种渗透方法实现SQL注入实验。以SQL注入攻击特点为基础,提出四种具体防御措施。实验表示,此防御措施Web应用系统能够对大部分SQL注入攻击进行防范,并且对于Web应用系统中的SQL注入点具有良好的识别效果。 Most of the modern SQL injection detection is based on the parsing strategy,but the efficiency of this strategy detection is low,and there are still some problems of imperfect vulnerability scanning. The design of a Web-based vulnerability scanning system for SQL injection is realized. The technology of detecting and defending SQL injection vulnerabilities is studied. Through the local experimental environment,Pubs database is used as a case and a variety of penetration methods to realize the experiment of SQL injection. Based on the characteristics of SQL injection attack,four specific defense measures are proposed. Experiments show that this defense measure Web application system can prevent most of the SQL injection attacks,and has a good recognition effect for the SQL injection points in Web application system.
作者 叶梦雄 YE Meng-xiong(Xi'an Aeronautical Polytechnic Institute,Xi'an 710089,China)
出处 《电子设计工程》 2019年第16期20-23,28,共5页 Electronic Design Engineering
关键词 WEB SQL 漏洞扫描系统 Pubs数据库 Web SQL vulnerability scanning system Pubs database
  • 相关文献

参考文献13

二级参考文献63

  • 1仇新梁,康迪,周涛.Web漏洞扫描系统设计[J].保密科学技术,2011(2):18-20. 被引量:1
  • 2陈小兵,张汉煜,骆力明,黄河.SQL注入攻击及其防范检测技术研究[J].计算机工程与应用,2007,43(11):150-152. 被引量:73
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4Clarke J.SQL注入攻击与防御[M].黄晓磊,李化,译.北京:清华大学出版社,2010.
  • 5CLARKE J,黄晓磊,李化译.SQL注入攻击与防御[M].清华大学出版社,2010.
  • 6WIKIPEDIA. Web 2.0[EB/OL]. http://en.wikipedia.org/wiki/ Web_2.0, 2014/2014-08-12.
  • 7OWASP. Top 10 2010-Main[EB/OL]. https://www.owasp.org/ index.php/Top_10_2010-Main, 2010-04-26/2014-08-21.
  • 8OWASP. OWASP Top 10-2013[EB/OL]. http://www.owasp.org. cn/owasp-project/dowrdoad/OWASPTop 102013V 1.2.pdf, 2013/2014- 08-21.
  • 9oschina.SQL 注入的历史教训[EB/OL]. http://www.oschina.net/ translate/sql-inj ection-vulnerability-history, 2014/2014-08-22.
  • 10Aimeur E, Schonfeld D. The ultimate invasion of privacy: Identity theft[C]//Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on. IEEE, 2011: 24-31.

共引文献48

同被引文献20

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部