Font Size: a A A

Web Application Vulnerability Research And Security Defense Design

Posted on:2016-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y P WangFull Text:PDF
GTID:2298330470957729Subject:Information security
Abstract/Summary:PDF Full Text Request
Information technology is a double-edged sword. It brought us convenience and progress, but also brought the security risks and threats. In the current network environment, it is necessary to build a secure and stable system to prevent opponents harbor, commercial competition and hacking.In this paper, research the detection techniques of common web application vulnerability. It presents a method for detecting SQL injection, XSS, upload vulnerability, CSRF vulnerability, etc. This paper presents a precaution about how to defense some common vulnerabilities. And initially proposed a Web application vulnerability scanning system. This paper introduces a real-time monitoring system for operations and describes the system requirements analysis. It determine the basic functions, framework and related technologies of the system. And implement a real-time monitoring system for operations. This paper introduces related content of the level of protection. It describes the need for penetration testing, real-time monitoring system, intrusion detection systems and information security management technology. It research the basic principles, workflow and deployment scenarios of the intrusion detection system. It also research the related standards for information security management and an Information Security Management System. Based on these research results, I propose an information security system.This paper designs and implements a web application vulnerability detection and a real-time monitoring system of operations. Through test, we verify the performance of systems. The test results show that the Web application vulnerability detection methods and the real-time monitoring system of operations can meet the design requirements. It also research the intrusion detection technology and information security management. Combined level of protection, it presents a security system that vulnerability detection, real-time monitoring system of operations, intrusion detection systems and information security management technology is the core.
Keywords/Search Tags:Information Security, Web application vulnerabilities, Real-time monitoring, Level of protection, Intrusion Detection, Security Management
PDF Full Text Request
Related items