期刊文献+

一种基于预警信息的漏洞自动化快速防护方法 被引量:1

A rapid and automatic vulnerability protection scheme based on warning information
下载PDF
导出
摘要 针对当前Web应用防护方法无法有效应对未知漏洞攻击、性能损耗高、响应速度慢的问题,本文从漏洞预警公告中快速提取漏洞影响范围和细节,然后对目标系统存在风险的访问请求与缺陷文件和函数调用关系进行自动化定位,构建正常访问模型,从而形成动态可信验证机制,提出并实现了基于预警信息的漏洞自动化快速防护方法,最后以流行PHPWeb应用的多个高危漏洞对本文方法进行验证测试,结果表明本文方法能够自动化快速成功阻止最新漏洞攻击,平均性能损耗仅为5.31%。 Aiming at the problem that current Web application protection schemes can not effectively deal with unknown vulnerability attacks, with high performance loss and slow response speed, this paper extracts the scope and details of vulnerabilities from vulnerability warning announcements, and then automatically locates the relationship between access requests and defective files and function calls that exist risks in the target system, and constructs a normal access model, thus forming dynamic trusted authentication mechanism, proposed and implemented a rapid vulnerability automation protection scheme based on warning information. Finally, several high-risk vulnerabilities of popular PHP Web applications were tested to verify the scheme. The results show that the scheme can automatically and successfully prevent the latest vulnerability attacks, with an average performance loss of only 5.31%.
作者 徐其望 陈震杭 彭国军 张焕国 XU Qiwang;CHEN Zhenhang;PENG Guojun;ZHANG Huanguo(Key laboratory of space information security and trusted computing,ministry of education,wuhan university,School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China;Nsfocus Information Technology Co.,Ltd.,Beijing 100089,China)
出处 《信息安全学报》 CSCD 2020年第1期74-82,共9页 Journal of Cyber Security
基金 NSFC-通用技术基础研究联合基金(No.U1636107) 国家自然科学基金(No.61972297)资助
关键词 漏洞预警 漏洞防护 动态可信 调用分析 WEB安全 vulnerability warning vulnerability protection dynamic trustworthiness invocations analysis web security
  • 相关文献

参考文献4

二级参考文献16

  • 1Anup K Ghosh, Aaron Schwartzbard, Michael Schatz. Learning program behavior profiles for intrusion detection. In: Proceedings of the 1 st USE-NIX Workshop on Intrusion Detection and Network Monitoring. Santa Clara, California, 1999 被引量:1
  • 2Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. http : ∥ www . ietf . org/ internet-drafts/ draft-ietf-idwg-idmef- xml-10 . txt . 2003 被引量:1
  • 3Wenke Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems: [PhD Dissertation]. Columbia University, 1999 被引量:1
  • 4S A Hofmeyr, S Forrest, A Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998,6:151-180 被引量:1
  • 5Me L. Genetic algorithms, a biologically inspired approach for security audit trails analysis, short paper, presented at the 1996 IEEE Symposium on Security and Privacy. Oakland, CA, 1996 被引量:1
  • 6Rebecca Gurley Bace. Intrusion Detection. U S A: Macmillan Technical Publishing, 1999 被引量:1
  • 7Sushil Jajodia, Peng Liu, Paul Ammann. A fault tolerance approach to survivability. Symposium on Protecting NATO Information Systens in the 21st Century. Washington D C, 1999 被引量:1
  • 8M Hsueh, T Tsai, R K Iyer. Fault injection techniques and tools. Computer, 1997,30(4) :75-82 被引量:1
  • 9D Wagner, J S Foster, E A Brewer, A Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In: Proceedings of 7th Network and Distributed System Security Symposium. 2000 被引量:1
  • 10C Kahn, P A Porras, S Staniford-Chen, B Tung. A common intrusion detection framework. (Submitted to Journal of Computer Security) 1998 被引量:1

共引文献18

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部