期刊文献+

Linux环境中基于PHP的SQL注入攻击与对策 被引量:4

SQL Injection Attack and Countermeasures Based on PHP in Linux
原文传递
导出
摘要 由于PHP本身的缺陷和应用程序开发者安全防范意识不强,使得应用PHP技术的网站存在很多安全问题,而SQL注入就是利用此类漏洞来实施攻击。论文结合应用开发中的经验剖析攻击者SQL注入的方法和入侵的思路,并且提出相应的防御策略。 Due to the defects of the PHP language itself and weak awareness of network security of application programmers, there exist various security issues which are usually used by SQL injection attackers. Regarding to application programming experiences, some methods of SQL injection attackers were discussed and the intents of attackers behind such threats were looked into. Countermeasures to deal with SQL injection attack were also provided accordingly.
作者 张卓 薛质
出处 《信息安全与通信保密》 2006年第9期154-157,160,共5页 Information Security and Communications Privacy
关键词 PHP SQL注入攻击 字段扫描 数据库 网络后门 PHP SQL injection attack segments scan database webshell
  • 相关文献

参考文献2

  • 1[4]Charles C,Marjorie C,John K.Kylix开发人员指南[M],北京:人民邮电出版社,2002
  • 2[5]Loureiro N.Programming PHP with security in mind[J].Linux journal,2002,2002(102)

同被引文献19

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2张海林,杜忠友,田学雷.基于ASP.NET技术的安全网站设计[J].商场现代化,2007(02X):65-66. 被引量:4
  • 3Martin B,Brown M,Paller A.2009 CWE/SANS Top 25 Most Dangerous Programming Errors[EB/OL].[2009-10-23].http://cwe.mitre.org/top25/pdf/2009_cwe_sans_top_25.pdf.
  • 4Buehrer G,Weide B W,Sivilotti P A G.Using Parse Tree Validation to Prevent SQL Injection Attacks[C]//5th International Workshop on Software Engineering and Middleware.Lisbon,Portugal:[s.n.],2005:106-113.
  • 5Kieyzun A,Guo P J,Jayaraman K,et al.Automatic Creation of SQL Injection and Cross-site Scripting Attacks[C]//Proceedings of the 2009 IEEE 31st International Conference on Software Engineering.Vancouver,Canada:[s.n.],2009:199-209.
  • 6Halfond W G J,Orso A.AMNESIA:Analysis and Monitoring for NEutralizing SQL-injection Attacks[C]//Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering.Long Beach,CA,USA:[s.n.],2005:22-28.
  • 7Anley C. Advanced SQL Injection in SQL Server Applications[M]. [s.l.]: Next Generation Security Software Ltd., 2002.
  • 8Halfond W G, Viegas J, Orso A. A Classification of SQL-injection Attacks and Countermeasures[C]// Proceedings of the IEEE International Symposium on Secure Software Engineering.[s.l.]: IEEE, 2006.
  • 9戴牡红,曾平.Oracle数据库中SQL注入攻击的检测与防御[J].信息安全与通信保密,2007,29(9):143-144. 被引量:6
  • 10王丽丽,彭一楠,王轶骏.浅析SQL盲注攻击的实现[J].信息安全与通信保密,2008,30(5):71-73. 被引量:5

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部