Font Size: a A A

Design And Implementation Of A Security Scheme Based On Online Shopping Parity Tools

Posted on:2015-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2298330467963807Subject:Information security
Abstract/Summary:PDF Full Text Request
With the continuous development of E-commerce during recent years, more third-party E-commerce parity sites, which respectively provided search, preferential services and operations, technology to consumer and E-commerce merchants, show great potential for development. Online shopping parity tools, meeting the needs of the market and making up the online shopping search and preferential services vacancies, has gradually become more and more users shopping habits. However, because of not enough emphasis, it’s increasingly prominent to maintain an efficient solution to security issues which appear in the process of developing and promotion of online shopping parity tools. Therefore, from the perspective of technology, design and realization of a feasibility security solution is imminent.First and foremost, the article was based on the open source Firefox and Chrome browser, which applied the application programming interface to browser extensions, analyzed and found classification of browser malicious behavior were derived from XPCOM and NPAPI. In this paper, based on component principle of browser extensions and operating principle of browser extensions, we investigated into the behavior of the browser extensions which were executing within Firefox and Chrome, and classified the malicious browser extensions into three categories.Then, this paper focused on online shopping parity tools mainly involves to the relevant techniques, including browser extension techniques, B2C openAPI techniques, directional web crawler techniques, Web script techniques, and font-end language techniques. Simultaneously, this paper introduced key points of online shopping parity tools include overall architecture database structure and related subsystems. After all those above, the article has summarized the details of both the vulnerability and the corresponding security solution program.In the last part, according to the designs above,30online shopping parity extension tools have been tested and analyzed in the respect of the indirect behavioral. The security vulnerabilities statistics were compared with the previous on online shopping parity site.
Keywords/Search Tags:online shopping parity tools, browser extensions security, site security, classification of browser malicious behavior
PDF Full Text Request
Related items