透過您的圖書館登入
IP:3.147.66.178
  • 學位論文

停止惡意掃描的陷阱系統

A Trap-based System for Stopping Malicious Crawler

指導教授 : 林金城
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來,網路寬頻的蓬勃發展,網路的便利性與快速帶動許多的網路服務。而網路服務中搜索引擎的便利與強大除了能取得的知識、工具與技巧更能夠快速找尋到各種網站。搜索引擎會如此便利靠的是他那強大的資料庫及爬取掃描各網站抓取資料的網路爬蟲與網路機器人。網路爬蟲可以蒐集分析全球網頁資料帶給人許的方便,但相對便利的地方被駭客或是惡意不肖的人使用就成了這些人犯罪入侵竊取資料最好的工具。這些工具不像一般木馬程式或是病毒可以透過防毒軟體做偵測,但被惡意的人使用卻可以像木馬程式或是病毒一樣抓取使用者的資料及網站內容,本論文主要提出是利用陷阱方式並加以整合來阻止這類的惡意程式抓取網站內容資料。

並列摘要


In recent years, the high speed networks is rising and flourishing , the convenience of the network is to drive a lot of Web Service . The convenience of Search engine and Web Service not only can access to knowledge , tools and techniques but also find any kinds of sites quickly . The search engine can be so convenience because it relies on powerful database with crawling and scanning site of the information network , the Web crawler and Robot. The Analysis of Web crawler can collect information on World Wide Web has brought convenience to many people, but relatively , convenient place malicious hackers or unscrupulous use of these people have become criminal invasion of the best tools to steal information . These tools not generally Trojans or viruses can be detected by antivirus software to do , but the use of malicious Trojans can be like a virus , like crawling or the user's information and site content . This paper proposed the use of traps and integrated approach to prevent malicious programs such as Web site content to crawling.

並列關鍵字

Web Service Web Crawler Search engine Robot

參考文獻


[2] Y. W. Huang, C. H. Tsai, T. P. Lin, S. K. Huang, D. T. Lee and S.Y. Kuo, A Testing Framework for Web Application Security Assessment, Journal of Computer Networks, Vol.48, No.5, pp.739-761, 2005
[4] S. Raghavan and H. Garcia-Molina, Crawling the hidden Web, in: Proceedings of the 27th VLDB Conference, pp. 129–138, 2001
[6] A. Manuel, P. Alberto. R. Juan and H. Justo, Crawling Web pages with support for client-side dynamism, WAIM 2006, LNCS 4016, pp.252-262, 2006
[7] Y. W. Huang, S. K. Huang, T. P. Lin and C. H.T Sai, Web Application Security Assessment by Fault Injection and Behavior Monitoring, in: Proceedings of the Twelfth International World Wide Web Conference, pp.148-159, 2000
[15] Reverse Turing test, http://en.wikipedia.org/wiki/Reverse_Turing_test

延伸閱讀