The Research and Application of Webpage Temper-proofing System

Full Text (PDF, 75KB), PP.16-20

Views: 0 Downloads: 0

Author(s)

Wu Beihua 1,* Wang Yongquan 1

1. East China University of Political Science and Law, Shanghai, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2012.03.03

Received: 22 Feb. 2012 / Revised: 12 Apr. 2012 / Accepted: 9 May 2012 / Published: 15 Jun. 2012

Index Terms

Network security, temper-proofing, core embedded technology

Abstract

With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. The attack to websites, especially the explosion of webpage interpolating incidents has become one of the most serious problems of it. In this paper, the system adopts Web server core embedded technology to imbed tamper detection module and application protection module into the Web server, define corresponding strategies for temper-proofing, and realize the real-time monitoring and protection of web pages and the dynamic content in databases.

Cite This Paper

Wu Beihua,Wang Yongquan,"The Research and Application of Webpage Temper-proofing System", IJWMT, vol.2, no.3, pp.16-20, 2012. DOI: 10.5815//ijwmt.2012.03.03

Reference

[1]CNCERT/CC, “China Internet network security report in the first half of 2010,” http://www.cert.org.cn/articles/docs/common/ 2010092925138.shtml.

[2]“Introduction to intrusion detection systems,” http://netsecurity. about.com/ cs/hackertools/a/aa030504.htm.

[3]Zhang Lei, Wang Lina, Wang Dejun, “Model of webpage tamper-proof system,” J.Wuhan Univ. (Nat.Sci.Ed.), Vol.55, No.1, pp.121–124 (in Chinese).

[4]Wu Beihua, “SQL injection defense mechanisms for iis+asp+mssql web applications,” J. China Communications, vol. 7, No.6, pp.145–147

[5]“How to configure the URLScan tool, ” http://support.microsoft.com/ kb/326444/en-us.

[6]“Core embedded technology,” http://www.tcxa.com.cn/technology/ technology_embeddinwebserver.htm (in Chinese).

[7]Fan Jianhua, Song Yunbo, “Web page tamper-resistant mechanism based on file-filtering driver and event-triggering”, J. Chongqing Institute of Technology (Natural Science), Vol.23, No.12, pp.65–70 (in Chinese).

[8]Zhang Jianhua, Li Tao, Zhang Nan, “Mechanism of anti-modification and anti-replacement on web pages”, J. Computer Applications, 2006, 26(2), pp.327-331(in Chinese).