完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chen, Jan-Min Jr | |
dc.contributor.author | Wu, Chia-Lun Jr | |
dc.date.accessioned | 2011-01-10T00:06:09Z | |
dc.date.accessioned | 2020-05-18T03:10:48Z | - |
dc.date.available | 2011-01-10T00:06:09Z | |
dc.date.available | 2020-05-18T03:10:48Z | - |
dc.date.issued | 2011-01-10T00:06:09Z | |
dc.date.submitted | 2010-12-16 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/29852 | - |
dc.description.abstract | As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. Too many nouns web application security vulnerabilities result from generic input validation problems. Examples of such vulnerabilities are SQL injection and Cross- Site Scripting (XSS). Although the majority of web vulnerabilities are easy to understand and to avoid, many web developers are, unfortunately, not security-aware. As a result, there exist many web sites on the Internet that are vulnerable. This paper implemented an automated vulnerability scanner that for the injection attacks. To this end, we implemented a system that automated scanned the injection attack vulnerabilities. Our system was automatically analyses web sites with the aim of finding exploitable SQL injection and XSS vulnerabilities. It was able to find many potentially vulnerable web sites. We picked 7 identified web sites with vulnerabilities from National Vulnerability Database [13] to verify our system. | |
dc.description.sponsorship | National Cheng Kung University,Tainan | |
dc.format.extent | 6p. | |
dc.relation.ispartofseries | 2010 ICS會議 | |
dc.subject | SQL-Injection | |
dc.subject | XSS | |
dc.subject | Complete Crawling | |
dc.subject | Security Scanner | |
dc.subject | Web Application Testing | |
dc.subject | Black-Box Testing | |
dc.subject.other | Information Security | |
dc.title | An Automated Vulnerability Scanner for Injection Attack Based on Injection Point | |
分類: | 2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站) |
文件中的檔案:
沒有與此文件相關的檔案。
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。