| dc.contributor.advisor | 陳恭 | zh_TW |
| dc.contributor.author (Authors) | 賴淑美 | zh_TW |
| dc.contributor.author (Authors) | Lai, Shu Mei | en_US |
| dc.creator (作者) | 賴淑美 | zh_TW |
| dc.creator (作者) | Lai, Shu Mei | en_US |
| dc.date (日期) | 2009 | en_US |
| dc.date.accessioned | 9-May-2016 12:02:16 (UTC+8) | - |
| dc.date.available | 9-May-2016 12:02:16 (UTC+8) | - |
| dc.date.issued (上傳時間) | 9-May-2016 12:02:16 (UTC+8) | - |
| dc.identifier (Other Identifiers) | G0093971007 | en_US |
| dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/94853 | - |
| dc.description (描述) | 碩士 | zh_TW |
| dc.description (描述) | 國立政治大學 | zh_TW |
| dc.description (描述) | 資訊科學學系 | zh_TW |
| dc.description (描述) | 93971007 | zh_TW |
| dc.description.abstract (摘要) | 在網路的應用蓬勃發展與上網使用人口不斷遞增的情況之下,透過網路提供客戶服務及從事商業行為已經是趨勢與熱潮,而伴隨而來的風險也逐步顯現。在一個無國界的網路世界,威脅來自四面八方,隨著科技進步,攻擊手法也隨之加速且廣泛。網頁攻擊防範作法的演進似乎也只能一直追隨著攻擊手法而不斷改進。但最根本的方法應為回歸原始的程式設計,網頁欄位輸入資料的檢核。確實做好欄位內容檢核並遵守網頁安全設計原則,嚴謹的資料庫存取授權才能安心杜絕不斷變化的攻擊。但因既有系統對於輸入欄位內容,並無確切根據應輸入的欄位長度及屬性或是特殊表示式進行檢核,以致造成類似Injection Flaws[1]及部分XSS(Cross Site Scripting)[2]攻擊的形成。 面對不斷變化的網站攻擊,大都以系統原始碼重覆修改、透過滲透測試服務檢視漏洞及購買偵測防禦設備防堵威脅。因原始碼重覆修改工作繁重,滲透測試也不能經常施行,購買偵測防禦設備也相當昂貴。 本研究回歸網頁資料輸入檢核,根據輸入資料的長度及屬性或是特殊的表示式進行檢核,若能堅守此項原則應可抵禦大部分的攻擊。但因既有系統程式龐大,若要重新檢視所有輸入欄位屬性及進行修改恐為曠日費時。本文中研究以側錄分析、資料庫SCHEMA的結合及方便的欄位屬性定義等功能,自動化的處理流程,快速產生輸入欄位的檢核依據。再以網站動態欄位檢核的方式,於網站接收使用者需求,且應用程式尚未處理前攔截網頁輸入資料,根據事先明確定義的網站欄位屬性及長度進行資料檢核,如此既有系統即無須修改,能在最低的成本下達到有效防禦的目的。 | zh_TW |
| dc.description.abstract (摘要) | With the dynamic development of network application and the increasing population of using internet, providing customer service and making business through network has been a prevalent trend recently. However, the risk appears with this trend. In a borderless net world, threaten comes from all directions. With the progress of information technology, the technique of network attack becomes timeless and widespread. It seems that defense methods have to develop against these attack techniques. But the root of all should regress on the original program design – check the input data of data fields. The prevention of unceasing network attack is precisely check the content of data field and adhere to the webpage security design on principle, furthermore, the authority to access database is essential. Since most existing systems do not have exactly checkpoints of those data fields such as the length, the data type, and the data format, as a result, those conditions resulted in several network attacks like Injection Flaws and XSS. In response to various website attack constantly, the majority remodify the system source code, inspect vulnerabilities by the service of penetration test, and purchase the equipment of Intrusion Prevention Systems(IPS). However, several limitations influence the performance, such as the massive workload of remodify source code, the difficulty to implement the daily penetration test, and the costly expenses of IPS equipment. The fundamental method of this research is to check the input data of data fields which bases on the length, the data type and the data format to check input data. The hypothesis is that to implement the original design principle should prevent most website attacks. Unfortunately, most legacy system programs are massive and numerous. It is time-consuming to review and remodify all the data fields. This research investigates the analysis of network interception, integrates with the database schema and the easy-defined data type, to automatically process these procedures and rapidly generates the checklist of input data. Then, using the method of website dynamic captures technique to receive user request first and webpage input data before the system application commences to process it. According to those input data can be checked by the predefined data filed type and the length, there is no necessary to modify existing systems and can achieve the goal to prevent web attack with the minimum cost. | en_US |
| dc.description.tableofcontents | 第一章、 緒論 1 1.1 研究動機 1 1.2 研究目的 1 1.3 本研究之貢獻 3 1.4本研究之限制 3 1.5本論文之章節架構 4 第二章、 技術背景與相關研究 5 2.1 網站攻擊 6 2.2注入攻擊 (INJECTION FLAWS) 8 2.3跨站腳本攻擊CROSS SITE SCRIPTING (XSS) 11 2.4 WEB安全防禦方式 13 2.5動態攔截檢核 15 2.6 INTERNET SERVER APPLICATION PROGRAMMING INTERFACE (ISAPI) 16 2.7 REGULAR EXPRESSION 18 第三章、 系統設計 20 3.1系統架構說明 20 3.2側錄網頁操作的資料 22 3.3分析側錄資料內容 24 3.4防禦偵測比對資料的確認 25 3.5網頁輸入資料透過檢核資料偵測防禦 26 第四章、 系統實作與實驗 29 4.1實驗環境 29 4.2側錄分析網頁操作資料-環境設定 30 4.3側錄分析網頁操作資料-分析 31 4.4分析結果確認及加入特殊判斷 34 4.4.1分析結果確認-結合資料庫欄位屬性 34 4.4.2自訂網頁輸入欄位屬性及長度 35 4.4.3產生「防禦偵測比對資料」 36 4.5網頁輸入資料透過檢核資料偵測防禦 38 4.5.1環境設定 38 4.5.2過濾靜態網頁 39 4.5.3 檢查網頁輸入資料 39 4.5.4 回應檢查檢查結果 42 4.5.5 實驗檢核資料 43 4.6防禦檢測對效能造成的影響 43 4.6.1測量方式 44 4.6.2測量情境 45 4.6.3測量結果 46 第五章、 結論 48 參考文獻 49 | zh_TW |
| dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0093971007 | en_US |
| dc.subject (關鍵詞) | 跨站腳本攻擊 | zh_TW |
| dc.subject (關鍵詞) | 注入弱點 | zh_TW |
| dc.subject (關鍵詞) | 網站攻擊 | zh_TW |
| dc.subject (關鍵詞) | 動態攔截檢核 | zh_TW |
| dc.subject (關鍵詞) | 檢查網頁輸入資料 | zh_TW |
| dc.subject (關鍵詞) | Injection Flaws | en_US |
| dc.subject (關鍵詞) | Cross Site Scripting | en_US |
| dc.subject (關鍵詞) | website attack | en_US |
| dc.subject (關鍵詞) | website dynamic captures technique | en_US |
| dc.subject (關鍵詞) | check the input data of data fields | en_US |
| dc.title (題名) | 運用使用者輸入欄位屬性偵測防禦資料隱碼攻擊 | zh_TW |
| dc.title (題名) | Preventing SQL Injection Attacks Using the Field Attributes of User Input | en_US |
| dc.type (資料類型) | thesis | en_US |
| dc.relation.reference (參考文獻) | 1. Injection Flaws http://www.owasp.org/index.php/Injection_Flaws 2. XSS http://en.wikipedia.org/wiki/Cross-site_scripting 3. Google_hacking http://en.wikipedia.org/wiki/Google_hacking 4. 阿碼科技 2008.05.20新聞「台灣網站遭受有史以來最大規模SQL Injection 攻擊 新型態的Mass SQL Injection在台上演」 http://www.armorize.com.tw/news/shownews.php?news=22 5. 林玉美,「基於資料探勘技術之網站應用型入侵防禦系統」,國立台灣科技大學資訊工程系研碩士學位論文 6. OWASP公布最新2007年版十大Web安全漏洞---OWASP介紹與近期發展 http://owasp.org.tw/blog/2007/05/owasp2007webowasp.html 7. The Open Web Application Security Project (OWASP) http://www.owasp.org/index.php/Main_Page 8. SQL Injection (資料隱碼)– 駭客的 SQL填空遊戲(上) http://www.microsoft.com/taiwan/sql/SQL_Injection_G1.htm 9. 黃彥棻 2008-06-13SQL Injection機器人來襲 10. 淺談網路應用程式安全(一) 中央研究院計算中心通訊電子報 http://newsletter.ascc.sinica.edu.tw/news/read_news.php?nid=1288 11. ISAPI http://www.oreilly.com.tw/sample_chap/a053_01.pdf 12. Regular Expressions - User guide http://www.zytrax.com/tech/web/regex.htm#intro 13. SQL Injection攻擊常見惡意字串,行政院研究發展考核委員提供之「Web應用程式安全指引草案修訂版_附件檔_970229.pdf」中(附件6 ) | zh_TW |