Font Size: a A A

The Design And Implementation Of The Protection About Injection Attact To Website

Posted on:2011-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:C LanFull Text:PDF
GTID:2298330392451798Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Nowadays the safety problems of the Internet are being widely concerned bymore and more specialists and scholars, and the importance about the informationsafety of our country are being more and more obvious. There are more and moreattacks to the website which could not easily to be prevented and it becomes aserious affect to the online interactive industry’s development.The Website attack means the action to the computer network without anyauthorities, the damage of the attacks to the website will normally cause the failurefor the website service and even more will achieve the purpose of damaging thehardware. In this section of the thesis it shows the analysis about the type of WEBATTACT among the attacks to the website.This thesis simulated to establish the Honeypot network system by the means ofestablishing an entrance to the school website within the virtual Honeypottopological environment to imitate the malicious attacker who cause the injectionattacks to this website. Use the Wfetch,Ethereal and other tools to Capture theattacker’s behavior when the injection attack comes. This thesis analysis all theactions when the website is successfully damaged, and find the account andpassword for managing the website and master the whole process of the attack thenanalysis and predict the development trend about it. Come to the result that by themeans of reinforcement about Identity verification will improve the safety of websiteBased on summary of attack actions, this thesis design a dual side verificationsystem, adding the challenge parameters to achieve the dual side verification for boththe user side and service side base on original identity verification, and then letcustomer to effectively prevent the injection attack to achieve the purpose ofdefending injection attacks to website.
Keywords/Search Tags:Honeypot, Honeynet
PDF Full Text Request
Related items