期刊文献+

一种基于渗透性测试的Web漏洞扫描系统设计与实现 被引量:1

Design and Implementation Based on the Test of Permeable Web Crack Sweeping System
在线阅读 下载PDF
导出
摘要 提出一种基于渗透性测试的Web漏洞扫描系统,给出了Web漏洞扫描系统的总体结构设计,研究了描述Web攻击行为所需要的特征信息及其分类,给出了Web攻击行为特征信息在数据库中的存储表结构。在Web攻击行为信息库中保存了超过230个不同的Web服务器信息,存在于Web服务器与CGI应用程序中的超过3 300个不同的已知漏洞信息,可以识别出绝大多数对未经修补或非安全Web服务器造成威胁的常见漏洞。 A penetration tested Web- based vulnerability .scanning system, and Web vulnerability scanning system, the overall structural design are given, Web attacks required characteristics and classification of information, the attacks on Web Behavior characteristics of the information stored in the database table structure are researched. Web attacked in the information base in the preservation of more than 230 different Web server and the information found in Web server and CGI applications in more than 3300 different from the known vulnerability information can be identified without the vast majority of repair or Web server pose a threat to the security of the common vulnerability.
出处 《现代电子技术》 2009年第7期82-85,共4页 Modern Electronics Technique
关键词 渗透性测试 Web漏洞扫描 Web攻击行为 WEB服务器 permeable test Web crack scanning Web aggressive behavior Web server
作者简介 齐建臣 男,1970年出生,陕西长安人,讲师。 贠卫国 男,1961年出生,山西平陆人,教授。主要研究方向为嵌入式系统,管控一体化。
  • 相关文献

参考文献9

  • 1Annual Report by CNCERT/CC [EB/OL]. http://www. cert. org. cn/,2006.
  • 2Sung Whan Woo,Omar H Alhazmi, Yashwant K Malaiy. An Analysis of the Vulnerability Discovery Process in Web Browsers [A]. In Proceedings of the 10 lASTED International Conference Software Engineering and Applications [C]. 2006.
  • 3ulfar Erlingsson, Benjamin Livshits, Yinglian Xie. End - to - End Web Application Security. Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS′07). USENIX Association Berkeley, San Diego,CA, 2007.
  • 4Johns M. SessionSafe.-Implementing XSS Immune Session Handling[A]. Proc. ESORICS[C]. 2006:444 -460.
  • 5Miter. Common Vulnerabilities and Exposures[EB/OL]. http ://cve. mitr. org/cve/, 2007.
  • 6Su Z, Wassermann G. The Essence of Command Injection Attacks in Web Applications[J].Proc. POPL, 2006,4 ( 1 ) : 372 - 382.
  • 7Yu D, Chander A, Islam N, et al. JaveSerip Instrumentation for Browser Security[J]. Proceedings of 34th Annual ACM SIGPLAN- SIGACT Symp. on Principles of Programming Languages[C]. France, 2007 : 237 - 249.
  • 8Savvis. Web Application Vulnerability & Penetration Testing [Z]. Transforming Information Technology, 2006.
  • 9耿哲,王秀美,王继龙,于洪奎.基于Web的漏洞扫描系统的设计与实现[J].计算机与现代化,2004(11):30-32. 被引量:3

二级参考文献3

  • 1Jeff Forristal, Greg Shipley. Vulnerability Assessment Scanners[DB/OL]. Http:∥www. Networkcomputing. Com/1201/1201flb1. Html,2001-01-08.
  • 2Renaud Deraison. Reduce the Costs of an Audit with Nessus 1.2[ DB/OL ]. http:∥www. nessus. com/pres/bh2001/index.html,2001-07-22.
  • 3Fyodor. Remote OS Detection via TCP/IP Stack FingerPrinting[DB/OL]. http:∥www. insecure. org/nmap/nmap-fingerprinting-article. html, 2002-06-11.

共引文献2

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部