期刊文献+

一种Web输入验证的鱼骨刺测试模型 被引量:1

A fishbone test model for Web input validation
下载PDF
导出
摘要 文章在分析Web缓冲区溢出、跨站点脚本编写(XSS)、SQL注入和规范化等4种输入攻击原理的基础上,提出一种输入验证的鱼骨刺测试模型。该模型根据每种攻击方式分门别类地设计测试方法和相应的测试用例,对Web各个交互文本框输入的数据进行全方位测试。同现有的方法相比,该模型对Web的测试更加全面,能有效防止多种Web攻击。 A fishbone test model for Web input validation is presented based on the analysis of four kinds of Web attacks including buffer overflow, XSS, SQL injection, and normalization. In order to prevent attacks from the persons with evil intention, strict input validation for every entering must be carried out. In the model,according to the attacking ways, some test methods and corresponding test cases are designed to test all kinds of data that come from Web input. Compared with the existing methods, this test model can prevent many kinds of Web attacks more effectively.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第4期527-530,共4页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(70471046) 教育部博士点基金资助项目(20040359004)
关键词 WEB攻击 输入验证 鱼骨刺 测试模型 Web attack input validation fishbone test model
  • 相关文献

参考文献9

  • 1陈荻玲,怀进鹏.一种Web服务安全通信机制的研究与实现[J].计算机研究与发展,2004,41(4):679-688. 被引量:14
  • 2Seo J, Kim H S, Cho S, et al. Web server attack categorization based on root causes and their locations[J]. Information Technology Coding and Computing, 2004, 26 (1): 90-96.
  • 3Di Lucca G A, Fasolino A R, Mastoianni M,et al. Identifying cross site scripting vulnerabilities in Web applications [C]//Proceedings of Sixth IEEE International Workshop. Chicago, IL: IEEE Press, 2004:71-80.
  • 4Offutt J, Wu Ye, Du Xaiochen, et al. Web application bypass testing[C]//IEEE International Symposium on Software Reliability Engineering. Bretagne, France: IEEE Press, 2004: 187-197.
  • 5Microsoft Corporation. Web 安全威胁与对策[EB/OL]. http://www. microsoft. com/china/msdn/library/architec- ture/architecture/architecturetopic/ImpWebSec/IWsec-mod75. mspx? mfr=true,2007-05-25.
  • 6Shao Zili, Xue Chun, Zhuge Qingfeng, et al. Efficient array & pointer bound checking against buffer overflow at- tacks via hardware/software[J]. Information Technology Coding and Computing, 2005,32(1) : 780-785.
  • 7Wei Ke,Muthuprasanna M, Kothari S. Preventing SQL injection attacks in stored procedures[C]//Software Engineering Conference on attacks. Australia: IEEE Press, 2006 : 18-21.
  • 8Maxion R A, Olszewski R T. Improving software robustness with dependability cases [EB/OL]. http://www. ca. cmu. edu/afs/cs. cmu. edu/user/maxion/www/pubs/maxionolszewski98. pdf, 2007-05-25.
  • 9Ismail O, Etoh M,Kadobayashi Y,et al. A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability [C]//Advanced Information Networking and Applications, 18th International Conference on, Vol 1,2004 : 145-151.

二级参考文献11

  • 1[1]D Austin, A Barbir. W3C Web services architecture requirements. Amsterdam: W3C, 2002. http://www.w3.org/TR/2002/WD-wsa-reqs-20020819
  • 2[3]F Curbera, Y Goland. Business process execution language for Web services 1.0. New York, NY: IBM, 2002. http://www.ibm.com/developerworks/library/ws-bpel/
  • 3[4]A Brown, B Fox. SOAP security extensions: Digital signature. Amsterdam: W3C, 2001. http://www.w3.org/TR/SOAP-dsig/
  • 4[5]B Atkinson, G Della-Libera. Web services security (WS-Security), Version 1.0. Redmond, WA: Microsoft, 2002. http://msdn.microsoft.com/ws/2002/04/Security/
  • 5[6]D Eastlake, J Reagle. XML encryption syntax and processing. Amsterdam: W3C, 2002. http://www.w3.org/TR/xmlenc-core/
  • 6[8]D Eastlake, J Reagle. XML-signature syntax and processing. Amsterdam: W3C, 2002. http://www.w3.org/TR/xmldsig-core/
  • 7[9]P Hallam-Bake. XML key management specification (XKMS), Version 2.0. Amsterdam: W3C, 2003. http://www.w3.org/TR/xkms2/
  • 8[10]P Hallam-Baker, E Maler. Security assertion markup language (SAML), Version 1.0. Billerica, MA: OASIS, 2002. http://www.oasis-open.org/committees/security/docs/
  • 9[11]Trust services integration kit. Mountain View, CA: Verisign, 2002. http://www.xmltrustcenter.org/developer/verisign/tsik/index.htm
  • 10[12]Web applications and services platform (WASP), Version 4.5. Cambridge, MA: Systinet, 2003. http://www.systinet.com/products/overview

共引文献13

同被引文献13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部