Font Size: a A A

Research And Implementation Of Security Testing Instrument For Network Broadcast Background System

Posted on:2012-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:X Z ZhangFull Text:PDF
GTID:2298330467464951Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Web application program has become a very popular service today and is most frequently attacked, the attack results in a huge loss to Web application program.During the period of Web application program development,test it to improve the anti-attack ability is a good to solve the problem.The emphasis and theme of this paper is the research and implementation of security testing instrument for network broadcast background system,all studies are carried out around the center.The security testing instrument can test security of the network broadcast system take the place of the human.Firstly, we will get requirement analysis of security testing instrument and then design the architecture and function structure of it and comply it with codes at last.The security testing instrument designed and implemented in the paper can do security work automatically.The data generated in testing process and the last result will be returned to users at last.The only thing users need to do is inputing URL address of network broadcast background system into security testing instrument. The security testing instrument can not only do security flaw detection work, but also find the module with problem and the codes result in security flaw. Then security testing instrument will try to solve the problem and verify the success of the modification by regression testing.At the last part of the paper we will test the security of network broadcast background system and by analyzing testing result we find that the security testing instrument meets the requirements raised in design stage and finish design targets of the paper. The testing instrument owns perfect expansibility because if you would like to detect other network charge the only task you need to do is integrating detection means of the attack.
Keywords/Search Tags:software testing, network security, SQL injection, cross-site scripting, HTTP
PDF Full Text Request
Related items