Font Size: a A A

Design And Implementation Of Web Monitoring And Web Tamper

Posted on:2011-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:H J ZhouFull Text:PDF
GTID:2208330332973000Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
First of all, this paper shows the grave security situation of the current website, webservices arise more broadly in internet, As network attack incidents occur frequently, WebPages tampering incidents grow with increasing number, security of web page and databases in web services become more and more serious. And then analyze the increasingly apparent inadaptability of the traditional security tools of website to Prevent website tampering over time, after that, It give an analysis of the current technology used in tamper-resistant software and the in adequacies of current website tamper-resistant software, and then put forward the goal of this research:to add the dynamic WebPages security inspection technology and process memory scanning technology to the previous website tamper-resistant technology system, organically combine with the two basic tamper-resistant technology (event trigging and external hanging poll),to enhance the ability of dynamic WebPages security defense and to achieve the targeted scan on file integrity, When web pages and databases are changed illegally, it can restore them in time. Finally the security of website is achieved.To implement the better match between efficiency and security in integrity protection of web documents, an anti-modification mechanism is brought out, and the relevant algorithms are given. In the mechanism, the signature from the file's attributes is verified firstly and then the signature from the content of file is checked if needed. The experiments show that the mechanism can carry better effect in both security and efficiency, to implement a website tamer-resistant system have integrative ability of security defense. And the web pages and databases real-time are supervised based on C/S three-tier architecture. When web pages and databases are changed illegally, it can restore them in time. Finally the security of web site is achieved.This system in accordance with the function of time to operate in tamper with the incident has divided into two parts:prior to intercept part and subsequently found that part. Prior to intercept part can be divided into two parts:the static and dynamic data file protections. The former use file filter driver technology to control intercept documents requested operation, the driver file operations using interceptor network packets to detect SQL injection and scripts aggression. Later found part adopts timing scanning method that has occurred prior to intercept part of revision, for the missing part intercept beforehand.Test results show that this system offers two basic function of file tamer-resistant software, that is the function of preventing the target file from being written and preventing documents is tampered from being read, in addition, this software has the ability of defense of SQL injection attack and script attack, furthermore, it can trigger the scan when it detected the behavior of attack and tamper, and the goal of the research is achieved successfully.
Keywords/Search Tags:website tamper-resistant, attribute of file, signature, hash function, SQL injection
PDF Full Text Request
Related items