透過您的圖書館登入
IP:216.73.216.78
  • 學位論文

網頁偵測防禦系統之精確度測量

Precision measurement of Web Detection and Prevention System

指導教授 : 林金城
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


注入攻擊是非常危險又無所無在的,注入攻擊的連年上升,迫使管理者對於注入攻擊也需要去了解注入是攻擊和學習防禦。可惜的是管理者雖然學著防禦注入式攻擊事件好事,但有些管理者訂的條件太過嚴苛而導致誤判上升,即便想對每一個HTTP要求來判定是否有攻擊行為,也需要強大的運算中心,才有可能對每一項HTTP做驗證。因此我們的系統提供一套機制,它會分析每一注入點的漏洞,而提出一套規則去防禦。管理者通常為了維護網站的基本運作,就會耗盡心力,因此我們系統可以幫助管理者去過濾使用者,並且調整過濾規則,也可藉由我們系統去觀察著攻擊者的行為,根據上述的情況,我希望管理者們能夠發現自身的網站存在著何種漏洞,而自行去修改程式,或是使用我們的系統的過濾規則來防禦,而當我們系統判斷出攻擊者時,我們會將它導到高互動系統,我們會記錄著使用者的攻擊行為已調整我們的防禦規則,而管理者就能藉此去做出適當的對應,不僅不影響原網站的運作情形,又能將攻擊者隔離到另外一個空間,而又能從觀察攻擊者行為的當中去理出攻擊模式。

並列摘要


Injection attack is very dangerous and nothing in injection attacks has risen every year, forcing managers to injection attacks also need to understand injection attacks and learn defense. Unfortunately, managers although learn defensive injection attacks good thing, but some managers set conditions too harsh and lead to miscarriage of justice to rise, even for each HTTP request to determine whether aggressive behavior, but also requires a powerful computing center, be possible to do validation on every HTTP. Our system provides a mechanism, it will analyze the vulnerability of each injection point, put forward a set of rules to the defense. Managers are usually in order to maintain the basic operation of the site, will run out of effort, so our system can help managers to filter the user, and adjust the filtering rules, but also by our system to observe the behavior of the attacker, according to the above I hope that managers can find own site with what vulnerabilities exist, and their own to modify the program, or use of our system of filtering rules to defense, and when we determine the attacker, it will be guide to the interactive system, we will record the user's attacks have to adjust our defense rules, and managers will be able to take to make the appropriate corresponding, not only does not affect the operation scenario of the original site, but also to attack isolation to another space, and from the observed behavior of the attacker, which get sort out attack mode.

參考文獻


[1] Yao-Wen Huang and Shih-Kun Huang and Tsung-Po Lin, “Web Application Security Assessment by Fault Injection and Behavior Monitoring” in WWW2003 (May 20-24, 2003, Budapest, Hungary)
[4] Paolo Tonella and Filippo Ricca, “A 2-Layer Model for the White-Box Testing of Web Applications” in IEEE International Workshop on Web Site Evolution (WSE), 2004.
[7] Yao-Wen Huang and Fang Yu and Christian Hang and Chung-Hung Tsai and D. T. Lee and Sy-Yen Kuo, “Verifying Web Applications Using Bounded Model Checking”, IEEE Computer Society Washington, DC, USA, 2004
[8] Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu, “An Automatic Mechanism for Sanitizing Malicious Injection”, Young Computer Scientists, 2008. ICYCS 2008.
[12] National Vulnerability Database, http://nvd.nist.gov/, visit on Jun 2010.

延伸閱讀