期刊文献+

Web攻击与防范实验设计 被引量:2

Experiment design of Web attack and defense
下载PDF
导出
摘要 针对"网络安全"课程中网络攻击与防范方面存在的教学问题,文章分析了问题原因,论证了设计Web攻击与防范实验项目的必要性,准备了植入Web安全漏洞的实验站点,这些安全漏洞均与Web开发密切相关。在实验教学中,采用任务驱动法教学模式,分阶段循序渐进,发挥了学生在实验教学中的主体作用,提高了学生开发安全Web应用的能力。 Aiming at teaching problems of the Web attack and defense in the course of network securi- ty, the paper analyses causes of these problems, puts forward necessity arguments of the experiment design of Web attack and defense, and prepares experimental Web site containing security vulnerabili- ties. These security vulnerabilities have closed correlations with Web development. During experimental teaching, the pattern of task driven is adopted, phases are divided clearly. Students exert subjective roles in the process of experimental teaching, and improve their abilities of secure Web application development.
出处 《实验室科学》 2016年第2期84-86,共3页 Laboratory Science
基金 国家自然科学基金"云计算中高效安全外包计算协议的研究"(项目编号:11271003)
关键词 WEB安全 任务驱动 实验设计 安全编程 Web security task driven experiment design secure programming
  • 相关文献

参考文献10

二级参考文献63

  • 1谌黔燕,郝玉洁,王建新,刘勇.“网络安全”课程中的实践教学研究与探索[J].计算机教育,2007(01S):38-40. 被引量:8
  • 2王皖陵,吴光龙.计算机专业实践教学体系的建立[J].实验室研究与探索,2007,26(6):85-86. 被引量:16
  • 3《信息安全专业指导性专业规范》项目组.信息安全类专业的专业指导规范[EB/OL].[2011-04-12].http://ishare.iask.sina.com.cn/f/17806091.html.
  • 4杜瑞颖,张焕国,彭国军,黄传河,傅杰.武汉大学信息安全专业实践教学体系的探索与研究[J].计算机教育,2007(10S):22-27. 被引量:24
  • 5LIU J, XIAO Y, GHABOOSI K, et al. Botnet: classification, at- tacks, detection, tracing, and preventive measures [ C ]// ICICIC'09: Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control. New York: ACM, 2009: 1184- - 1187.
  • 6WANG P, WU L, ASLAM B, et al. A systematic study on peer-to- peer botnets[ C]// ICCCN'09: Proceedings of International Confer- ence on Computer Communications and Networks. Washington, DC: IEEE Computer Society, 2009:1 -8.
  • 7DASWANI N, STOPPELMAN M. The anatomy of clickbot[ C]// Proceedings of the 1 st Workshop on Hot Topics in Understanding Botnets. Berkeley: USENIX Association, 2007.
  • 8LI J, EHRENKRANZ T, KUENNING G, et al. Simulation and a- nalysis on the resiliency and efficiency of malnets [ C ]// MMSM 2005: Proceedings of the 19 th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Soci- ety, 2005:262 - 269.
  • 9MAYMOUNKOV P, MAZIERES D. Kadernlia: A peer-to-peer in- formation system based on the xor metric[ C]//IPTPS: International Workshop on Peer-to-Peer Systems. Berlin: Springer, 2002:53 - 65.
  • 10STARNBERGER G, KRUEGEL C, KIRDA E. Overbot - a botnet protocol based on Kademlia[ C]// Proceedings of the 4th Interna- tional Conference on Security and Privacy in Communication Net- works. New York: ACM, 2008:1 -9.

共引文献43

同被引文献22

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部