期刊文献+

基于有限状态机的Web漏洞扫描器识别研究 被引量:3

Research of Identifying Web Vulnerability Scanner Based on Finite State Machine
下载PDF
导出
摘要 传统的基于关键字的Web漏洞扫描器识别方法容易被攻击者欺骗导致漏报.针对此问题提出了一种基于有限状态机的识别方法.对攻击者的扫描数据处理,以扫描器的扫描行为特征为迁移条件构建识别模型,并将模型状态转移过程抽象为多维向量,再利用余弦相似度公式进行相似度计算,结合设定的阈值,实现扫描器种类的判定.实验结果表明,在攻击者有意伪装的情况下,基于有限状态机的识别方法能更有效地识别扫描器的种类. The traditional keyword-based method to identify Web vulnerability scanner is easy to be cheated by attackers. Aiming at this problem, a new recognition method based on Finite-state machine is proposed. The scanning data of the attacker is processed and the recognition model could be constructed using the scan behavior of scanners as transition conditions. The model state transition process is abstracted as multidimensional vector, and then the cosine similarity formula is used to calculate the similarity. Combined with the set threshold, the type of scanner can be determined. The experimental results show that the identification method based on finite state machine can identify the scanner more effectively when the attackers intentionally masquerade.
出处 《信息安全研究》 2017年第2期123-128,共6页 Journal of Information Security Research
关键词 有限状态机 Web扫描器 漏洞 行为特征 佘弦相似度 finite-state machine Web scanner vulnerability behavioral characteristics cosine similarity
  • 相关文献

参考文献7

二级参考文献28

  • 1朱振国,鄢羽,张闽,周剑.一种量化的网络安全态势评估方法[J].微计算机信息,2007,23(21):62-64. 被引量:9
  • 2Faloutsos C. FastMap: A Fast Algorithm for indexing, Data-Min ing and Visualization of Traditional and Multimedia Datasets. In:Proc. of ACM SIGMOD, 1995. 163~174 被引量:1
  • 3Jagadish H V. A retrieval technique for similar shapes. In:Proc. ACM SIGMOD Conf, May 1990. 208~217 被引量:1
  • 4Torgerson S. Multidimensional scaling: I. theory and method. Psychometrika, 1952,17: 401~419 被引量:1
  • 5Kruskal J B, Wish M. Multidimensional scaling. SAGE publications, Beverly Hills, 1978 被引量:1
  • 6Ding C. Cluster merging and splitting in hierarchical clustering al gorithms. In:IEEE Intl. Conf. on Data Mining (ICDM'02), Dec. 2002. 139~146 被引量:1
  • 7APFELBAUM L,DOYLE J.Model-based testing[C]//Software Quality Week Conference in May,1997. 被引量:1
  • 8GURARI E.An introduction to the theory of computation[M].Jones and Barlett Publishers,Inc,2001. 被引量:1
  • 9DALAL S R,KARUNANITHI J N,LEATON J M,et al.Model-based testing in practise[M].ACM Press,1999. 被引量:1
  • 10360互联网安全中心.2014年中国网站安全报告.[2015-03-22]. http://webscan.360.cn, 2015-1-8. 被引量:1

共引文献57

同被引文献34

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部