基于SQL注入的數(shù)據(jù)安全測評技術(shù)研究
[Abstract]:With the rapid development of the application technology of B / S mode and the wide application of database in Web, SQL injection has gradually become one of the most commonly used methods for hackers to attack the database. However, due to the uneven level of program developers in the B / S mode, a considerable number of programmers did not fully consider the issue of validating the validity of the data entered by the user when developing the program. Make the application exist serious security hidden trouble. Therefore, the data security problem based on SQL injection vulnerability is of great significance. First of all, this paper analyzes the current research situation and technology development trend of SQL injection research at home and abroad. This paper expounds the relevant principles of SQL injection, and briefly analyzes the key technologies and basic principles of SQL injection, and analyzes the common attack methods of SQL injection attack one by one. At the same time, the SQL injection scanning technology and injection detection technology are analyzed and studied. Secondly, the working mechanism and technical characteristics of web crawlers are described in detail, and several forms of URL that need to be extracted from web crawlers are analyzed in detail. On this basis, the technology of DOM tree generation is analyzed and studied. Page control binding event technology, dictionary guesses, passive analysis, use search engine and other technologies. Then, the paper makes a detailed analysis and research on the technology of SQL injection in oracle database, which mainly includes the related knowledge of oracle database SQL injection, query statements, executing system commands, reading and writing files and so on. Finally, the defense technology of SQL injection is studied, several defense methods are put forward and the suitable conditions of each defense method are expounded. In this paper, a data security system based on SQL injection is constructed, and the partition of the system function module and the running example of the function module are given in this paper, and the effectiveness of the system is preliminarily verified by the testing of the actual website.
【學(xué)位授予單位】:沈陽工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2012
【分類號】:TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 陳崗,史長瓊,馬淑萍;基于SQL攻擊的SQL Server安全性研究[J];長沙交通學(xué)院學(xué)報;2005年01期
2 吳定剛;ASP.NET應(yīng)用中的“SQL注入”及解決方案[J];電腦知識與技術(shù);2005年18期
3 馬海濱;臧衛(wèi)華;李晨;周明姬;;SQL注入的危害、檢測及防范[J];電腦知識與技術(shù)(學(xué)術(shù)交流);2007年11期
4 劉帥;;SQL注入攻擊及其防范檢測技術(shù)的研究[J];電腦知識與技術(shù);2009年28期
5 陳熔;;基于SQL Server數(shù)據(jù)庫安全性的研究[J];福建電腦;2006年11期
6 宋利榮;羅文興;;淺談SQL Server安全系統(tǒng)的改進(jìn)[J];黔東南民族師范高等?茖W(xué)校學(xué)報;2006年06期
7 李超;;SQL SERVER 2000的安全機(jī)制[J];中國輕工教育;2006年01期
8 曾瑞;;SQL Injection和CSS Hole入侵解決方案研究[J];太原師范學(xué)院學(xué)報(自然科學(xué)版);2005年04期
9 王玉國,李啟鵬;SQL Server的安全機(jī)制分析及實(shí)現(xiàn)建議[J];通化師范學(xué)院學(xué)報;2004年10期
10 陳楠 ,薛質(zhì);SQL注入攻擊的實(shí)現(xiàn)和防范[J];信息安全與通信保密;2005年01期
相關(guān)碩士學(xué)位論文 前2條
1 張卓;SQL注入攻擊技術(shù)及防范措施研究[D];上海交通大學(xué);2007年
2 李小花;基于程序分析的SQL注入防御系統(tǒng)的設(shè)計與實(shí)現(xiàn)[D];湖南大學(xué);2010年
,本文編號:2265486
本文鏈接:http://sikaile.net/kejilunwen/sousuoyinqinglunwen/2265486.html