针对web应用程序常见攻击的防御设置进行优化调优

Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen
{"title":"针对web应用程序常见攻击的防御设置进行优化调优","authors":"Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen","doi":"10.1109/CCST.2009.5335560","DOIUrl":null,"url":null,"abstract":"Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Optimum tuning of defense settings for common attacks on the web applications\",\"authors\":\"Dwen-Ren Tsai, Allen Y. Chang, Peichi Liu, Hsuan-Chang Chen\",\"doi\":\"10.1109/CCST.2009.5335560\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.\",\"PeriodicalId\":117285,\"journal\":{\"name\":\"43rd Annual 2009 International Carnahan Conference on Security Technology\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"43rd Annual 2009 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2009.5335560\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"43rd Annual 2009 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2009.5335560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

摘要

来自不同来源的统计数据表明,大约75%的网络攻击发生在web应用程序中,并且这一趋势正在增长。web应用程序的不安全编码或应用程序本身的漏洞尚未修补,都存在较高的安全风险。除了检查源代码的白盒测试、漏洞扫描的黑盒测试或渗透测试外,还可以选择在服务器前端设置防御设施,例如:应用层入侵防御系统,或应用软件和硬件防火墙,以增强防御机制或获得更多时间来修补漏洞。本文利用现代企业广泛使用的应用防火墙,提出了一种优化调优方法。探讨了跨站脚本签名和SQL注入等目前常用的几种攻击方法,并引入了一种新的设置设备参数的方法来加强防御。为了增强后端应用服务器的安全性,我们使用关键字过滤和重处理来排除黑名单,并调整系统设置,使其能够有效地阻止攻击或降低攻击成功的可能性。此外,我们还通过漏洞扫描工具模拟了对网页浏览和应用程序的攻击,以测试应用系统的安全性,并确保对最佳调优参数进行必要的防御。这一概念在我们实施验证测试时确实产生了良好的结果。作为参考,值得推广。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Optimum tuning of defense settings for common attacks on the web applications
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Use of threat image projection (TIP) to enhance security performance Robustness against misuse - a new attribute of technical systems Face Identification based on TV videos Combining hand biometric traits for personal identification Evaluation methodology for analyzing usability factors in biometrics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1