文化大學機構典藏 CCUR:Item 987654321/19789
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46965/50831 (92%)
造访人次 : 12835717      在线人数 : 280
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/19789


    题名: 黑白名單機制於網頁應用防護之分析
    作者: 劉沛耆
    贡献者: 資訊安全產業研發碩士專班
    关键词: 黑名單
    白名單
    有限狀態機
    FSM
    日期: 2010
    上传时间: 2011-10-20 12:33:32 (UTC+8)
    摘要: 網際網路技術的蓬勃發展,促使著諸如個人化部落格、B2B、B2C電子商務或是網路金融交易,甚至是所謂的微網誌等不同應用類別的網站,如雨後春筍般出現,使用者數量更是以驚人的方式成長。因此,各種新型態的資訊安全事件亦層出不窮。從事資訊安全服務的廠商,在面對如此日新月異的網路惡意行為,除不斷的因應已經公開的系統與軟體漏洞進行修補之外,也不斷的尋求其他相應的設備或資源,來對惡意攻擊程式或攻擊行為模式進行分析、或對惡意程式特徵做比對、防禦、偵測、阻擋。
    而於既有的企業網路環境中,欲增加額外的防禦系統防止新型態的攻擊行為時,則又因為對資訊安全領域的不熟稔,在導入的過程中難免顯得窒礙難行。然而在各式各樣的防禦設備中,不外乎使用特徵比對、或異常偵測方式或是混合型,亦即所謂的黑名單或白名單機制的搭配組合。其攻擊防禦機制是否能藉由其特定的分類機制,使其在效能或安全防禦特性上有所助益,或甚其分類的方式而產生不同的狀況,則未有人能針對探討。
    本論文的目的,乃希望能基於HTTP(S)及網頁瀏覽的原理與組成架構,將所謂的黑白名單的設定加以分類,並透過Rule-Based與有限狀態機的搭配架構模型與測試,試圖以各名單類別組合架構,找出其黑白名單於網路應用程式符合效能與安全需求的組合建議;當企業在規劃或對現行網路環境調校資訊安全設備時,在其功能與網路安全設備的關聯規劃,或導入的過程與其測試的方式,提供一參考的依據,進而能加強網頁的應用安全。

    Due to the rapid development of Internet technology of promoting the blog, B2B, B2C e-commerce, online financial transactions , and even the micro-blog application, such as different types of websites have sprung up. The number of user is growing rapidly. Because of this, various new types of information security incidents are endless. Companies engaged in IT security services, in the face of such rapidly changing network malicious behavior, in addition to constantly chase already in the public system and software bug fixes, but also continue to seek other appropriate equipment or resources to malicious attacks program analysis or offensive behavior, or malware feature is matched against the defense, detection and blocking.
    Deploying additional defense system to prevent such new types of attacks in the existing enterprise network environment, field of information security and because of the non-familiar cause import process seems difficult to implement .
    However, in a variety of defense equipment, nothing more than use the feature matching , anomaly detection methods, hybrid, black list , white list and mechanism combinations.But there is no one talk about the relateionship between classification and the performation or safty.
    The purpose of this paper, is the hope that based on HTTP (S) and web browsing with the composition of the principle that according to black or white list to be classified, and using the Rule-Based and Finite State Machine(FSM) model and test, try to structure the portfolio list of categories to identify its black and white list applications on the network performance and meet the security needs of recommendations; The enterprises wishing to planning to add or adjust the existing network environment, information security devices, especially for the Web server used by the Web Application Firewall , in its functional relationship with the network security equipment planning or implementation process and its testing methods, provide a basis for reference, and thus could enhance existing web application security.
    显示于类别:[資訊工程學系] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    gsweb40.pdf1377KbAdobe PDF2021检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈