Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web application program bug detection method based on simulated strike

A vulnerability detection and simulated attack technology, applied in the field of vulnerability detection, can solve problems such as dangerous security risks and dangers, and achieve the effects of high operation efficiency, comprehensive and accurate security detection, and intuitive detection reports and analysis reports.

Inactive Publication Date: 2014-09-24
CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The wide application of web applications makes people's lives more convenient and faster, but at the same time, it also leads to more dangerous security risks and more dangerous consequences caused by vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web application program bug detection method based on simulated strike
  • Web application program bug detection method based on simulated strike
  • Web application program bug detection method based on simulated strike

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0021] figure 1 It is a structural diagram of the Web application vulnerability detection system, which mainly includes three parts: the vulnerability detection system, the target system and the background database. The vulnerability detection system includes a control module, a setting module, a crawler module, a simulated attack detection module and a display analysis module, which are respectively used to complete the functions of overall control, detection setting, Web page crawler and structure extraction, simulated attack and display analysis. The target system includes six common web application vulnerabilities, namely SQL injection vulnerability, dynamic execution vulnerability, unsafe direct object reference vulnerability, remote file inclusion vulnerability, file upload vulnerability and path traversal vulnerability. The vulnerability detecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Web application program bug detection method based on simulated strike. The method mainly adopts a bug detection system, a target system and a background database, wherein the bug detection system mainly comprises a control module, a set module, a crawler module, a simulated strike detection module, a display analysis module and the like, and respectively accomplish functions of integrated control, detection set, Web page crawler and structure extraction and simulated strike and display analysis. The method has the advantages that firstly, the method adopts a detection mode based on simulated strike, and has higher practicability; secondly, all bug detection engines are subjected to modularization and plug-in, different bug detection engines are convenient to integrate and new bug detection engines are convenient to expand; thirdly, bugs of Web application programs are classified, so that security detection is more comprehensive and accurate.

Description

technical field [0001] The invention belongs to a loophole detection method, in particular to a Web application loophole detection method based on simulated attack. Background technique [0002] With the development of Internet technology, Web application programs have been widely used and integrated into people's daily life. On the one hand, the Internet has developed from an early static site to a dynamic site. In recent years, technologies such as Ajax and DOJO have marked the arrival of the Web2.0 era; on the other hand, programs have gradually covered various areas of life, such as online banking, e-commerce, microblogging etc. The wide application of Web applications makes people's lives more convenient and faster, but at the same time, vulnerabilities may bring more dangerous security risks and produce more dangerous consequences. [0003] The emergence of web applications has brought new changes to the network security boundary. The new security boundary requires a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/57
Inventor 李千目汪欢
Owner CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products