• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, D. (Wang, D..) | Liu, L. (Liu, L..) | Lin, J. (Lin, J..) | Zhao, W. (Zhao, W..) | Du, X. (Du, X..)

收录:

Scopus PKU CSCD

摘要:

To improve the hidden injection point scanning coverage of cross site scripting(XSS) vulnerability detection and effectively determine whether there is XSS vulnerability attacks, a method was proposed to construct the Web state transition graph of the Web application, and to search the XSS vulnerability injection point during the construction of the graph. The document object model(DOM) state was used as the node, and the browser event as the edge to model the Web application and identify the hidden injection point. In the meanwhile, Web page analysis was combined with agent technology to enhance the judgment accuracy of the injection point. Firstly, the presence of the Web page was analyzed with the reference uniform resource locator(URL) and Form. Then, the Web page's element of the browser event was triggered to detect whether it contained the relevant data request, and to determine whether the Web page had a suspected vulnerability injection point. Thirdly, the suspected injection point was tested by using the probe vector technique. According to the output position of the probe vector, the injection point was classified and saved. In order to effectively determine whether there existed XSS vulnerability attack in the injection point, XSS Filter Evasion Cheat Sheet was transformed based on mutation operation and filtering escape technique. The attack vector with higher success rate was designed and classified according to the different response position. According to the different response location, the attack vector, the injection point and the injection attack result were classified, and different response result methods were designed to analyze whether there was XSS vulnerability. Finally, based on the above method, the XSS vulnerability detection system was designed and implemented, and the experimental comparison was carried out to verify its effectiveness. © 2018, Editorial Department of Journal of Beijing University of Technology. All right reserved.

关键词:

Crawler; Cross site scriping (XSS); Document object model(DOM); Selenium; State transition diagram

作者机构:

  • [ 1 ] [Wang, D.]Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 2 ] [Liu, L.]Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 3 ] [Lin, J.]Key Lab of Information Network Security of Ministry of Public Security, The Third Research Institute of Ministry Public Security, Shanghai, 200031, China
  • [ 4 ] [Zhao, W.]Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 5 ] [Du, X.]Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal of Beijing University of Technology

ISSN: 0254-0037

年份: 2018

期: 9

卷: 44

页码: 1208-1216

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 2

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 1

归属院系:

在线人数/总访问数:85/4299945
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司