Font Size: a A A

Research On Cross Station Offensive And Defensive Technology Based On Network Behavior Analysis

Posted on:2013-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:G ZhangFull Text:PDF
GTID:2248330395980676Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Higher security is needed with the increasing popularity, openness and application freedomof network information technology. Cross-site scripting (XSS) is an attack against webapplications where scripting code is injected into the output of an application which is sent to auser’s web browser then.In the browser, this scripting code is executed and used to transfersensitive data to a third party.Cross-site scripting can be regarded as a tool for further attacks byattackers.After successfully highjack the client-side browsers through cross-site scripting attack,attackers would be able to cause more serious damage with further attacks. In the background ofthe Web2.0times, XSS would bring more and more damages to the Internet. However, most ofthe developers are not take this attitude seriously enough.This paper first puts forward the research background and significance, analyzes the crossstation offensive and defensive technology the research status and development trend, this paperanalyzes the network behavior analysis method, this paper introduces the basic theory of crossstation attack: AJAX technology and XHR object, sandbox mechanism as well as thehomologous strategy, and then borrow a cross station attack principle and three kinds of basicmechanism are discussed based on the analysis of the network behavior across the station leakdetection technology, based on the network behavior to carry out across the station attackdetection technology analysis, proposes the overall design framework, dynamic stain analysisand static stain analysis, finally, the transmission point analysis and sensitive informationjudgment processing. Analysis based on traditional code analysis across the standing against thedefense, analyzes its deficiencies, to draw out based on the analysis of the network behaviorbehind the defence measures to ensure the foreshadowing. Based on the behavior of networksecurity policy, based on the network behavior analysis method was put forward to span standagainst defensive measures.
Keywords/Search Tags:XSS, Network behavior analysis, Network measure analysis, Security stratgey
PDF Full Text Request
Related items