CN103685189A - Website security evaluation method and system - Google Patents
Website security evaluation method and system Download PDFInfo
- Publication number
- CN103685189A CN103685189A CN201210345714.7A CN201210345714A CN103685189A CN 103685189 A CN103685189 A CN 103685189A CN 201210345714 A CN201210345714 A CN 201210345714A CN 103685189 A CN103685189 A CN 103685189A
- Authority
- CN
- China
- Prior art keywords
- page
- url
- dynamic
- website
- html page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a website security evaluation method and a website security evaluation system. The method comprises the following steps: performing dynamic webpage analysis or static webpage analysis according to a basic URL (Uniform Resource Locator) of a website, and acquiring all derived URLs of the website according to analysis result; performing loophole detection on webpages corresponding to all derived URLs of the website by using a plurality of detection models, and outputting loophole detection information, wherein each detection model corresponds to one application dimension; performing security evaluation on the website according to the loophole detection information. According to the method, all URL links of the website can be completely acquired through dynamic webpage analysis and static webpage analysis on the website, and meanwhile loopholes can be automatically detected through a plurality of preset detection models, the accuracy and the efficiency in detection are improved, and the website security evaluation can be efficiently and accurately achieved.
Description
Technical field
The present invention relates to Internet technical field, relate in particular to a kind of web portal security appraisal procedure and system.
Background technology
At present, the appraisal procedure of web portal security and system are relatively less, and the feasibility of current existing appraisal procedure is poor, cannot to the fail safe of website, assess accurately and efficiently.Therefore, need a kind of method and system of can efficiently and accurately, reasonably web portal security being assessed badly.
Summary of the invention
The present invention is intended at least one of solve the problems of the technologies described above.
For this reason, one object of the present invention is to propose a kind of web portal security appraisal procedure that can assess the fail safe of website accurately and efficiently.
Another object of the present invention is to propose a kind of web portal security evaluating system.
To achieve these goals, the web portal security appraisal procedure of embodiment according to a first aspect of the invention, comprise the following steps: according to the basic URL of website, carry out dynamic page analysis or static page analysis, and according to analysis result, obtain all derivation URL of described website; Use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, export all Hole Detection information, wherein the corresponding application dimension of each detection model; And according to the information of described Hole Detection, security evaluation is carried out in described website.
According to the web portal security appraisal procedure of the embodiment of the present invention, by dynamic page analysis being carried out in website and static page is analyzed, can obtain imperfectly all URL links of website; Simultaneously, by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting, thereby realize the web portal security assessment of efficiently and accurately, thus the fail safe of environment under line is had to better awareness and understanding, and then safe condition that can autotelic improvement product.
To achieve these goals, the web portal security evaluating system of embodiment according to a second aspect of the invention, comprise: scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of described website according to analysis result; Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And evaluation module, for safety evaluation being carried out in described website according to described Hole Detection information.
According to the web portal security evaluating system of the embodiment of the present invention,, by dynamic page analysis being carried out in website and static page is analyzed, can obtain imperfectly all URL links of website; Simultaneously, by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting, thereby realize the web portal security assessment of efficiently and accurately, thus the fail safe of environment under line is had to better awareness and understanding, and then safe condition that can autotelic improvement product.
The aspect that the present invention is additional and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Accompanying drawing explanation
Above-mentioned and/or the additional aspect of the present invention and advantage will become from the following description of the accompanying drawings of embodiments and obviously and easily understand, wherein,
Fig. 1 is the flow chart of web portal security appraisal procedure according to an embodiment of the invention;
Fig. 2 is the structural representation of web portal security evaluating system according to an embodiment of the invention; And
Fig. 3 is the structural representation of an embodiment of the scan module in Fig. 2.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Below by the embodiment being described with reference to the drawings, be exemplary, only for explaining the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise spirit and all changes within the scope of intension, modification and the equivalent that falls into additional claims.
In description of the invention, it will be appreciated that, term " first ", " second " etc. are only for describing object, and can not be interpreted as indication or hint relative importance.In description of the invention, it should be noted that, unless otherwise clearly defined and limited, term " is connected ", " connection " should be interpreted broadly, and for example, can be to be fixedly connected with, and can be also to removably connect, or connects integratedly; Can be mechanical connection, can be to be also electrically connected to; Can be to be directly connected, also can indirectly be connected by intermediary.For the ordinary skill in the art, can concrete condition understand above-mentioned term concrete meaning in the present invention.In addition,, in description of the invention, except as otherwise noted, the implication of " a plurality of " is two or more.
In flow chart or any process of otherwise describing at this or method describe and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of the step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Below with reference to accompanying drawing, describe according to the web portal security appraisal procedure of the embodiment of the present invention.
A web portal security appraisal procedure, comprises the following steps: according to the basic URL of website, carry out dynamic page analysis or static page analysis, and according to analysis result, obtain all derivation URL of website; Use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, export all Hole Detection information, wherein the corresponding application dimension of each detection model; And according to the information of Hole Detection, security evaluation is carried out in website.
Fig. 1 is the flow chart of web portal security appraisal procedure according to an embodiment of the invention.
As shown in Figure 1, according to the web portal security appraisal procedure of the embodiment of the present invention, comprise the steps.
Step S101, carries out dynamic page analysis or static page analysis according to the basic URL of website, and according to analysis result, obtains all derivation URL of website.
Particularly, the html page that first judgement is returned according to basic URL is static page or dynamic page.Static page if, directly html page is carried out to static page analysis obtains new URL.Dynamic page, first carries out dynamic analysis (being mainly to resolve by JS engine) to extract the dynamic URL of the page to html page if, then according to dynamic URL, carries out static page analysis and obtain new URL.Wherein, the process that static page is analyzed can, with reference to prior art, be not described in detail herein.
More specifically, if html page contains <script> and/or </script> statement block, determine that html page is dynamic page; Or, if html page contains event attribute, determine that html page is dynamic page; Or, if the property value of html page note contains the pseudo-agreement of javascript, determine that html page is dynamic page.Should be understood that above-mentioned example, only for schematically, is not limited to the present invention.
Step S102, is used a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, output Hole Detection information, the wherein corresponding application dimension of each detection model.
Particularly, in one embodiment of the invention, web portal security is divided to detection model corresponding to each application dimension from application dimension.That is to say, different detection method corresponding to leak kind, or the parsing of the static page, or dynamic attack detecting, finally export all leaks.Wherein, a plurality of detection models can comprise that XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution detection etc.
More specifically, the concrete grammar that XSS detects is, in URL request, appends specific character string, and whether the page returning according to this URL request comprises this specific character string judges whether XSS is suspicious in website.If do not comprised, determine that this website does not comprise XSS leak; If comprised, determine that website is suspicious, further according to a malicious script dictionary, this URL is carried out to fuzz testing, by returning results of each fuzz testing, give browser engine and remove Dynamic Execution, if malicious script is carried out, determine that so this website exists XSS leak.
SQL injects the concrete grammar detecting, one group of test string is appended in URL request successively, in the page returning according to this URL request, whether comprises the relevant error burst of predefined database (as MySQL, ORACLE, MSSQL) and judge that website possibility exists SQL to inject.If do not comprised, determine that this website does not exist SQL to inject; If comprised, determine that website is suspicious, further according to positive and negative two test strings, this URL is tested to (be appended to URL parameter value after), the similarity of two back pages of judgement, if the similarity of the page surpasses threshold value (as 50%), explanation does not exist SQL to inject, otherwise explanation exists SQL to inject.
The concrete grammar that the blind note of SQL detects is, the SLEEP function dictionary of SQL is appended to respectively in the parameter of URL, then sends URL request, and whether judgement is greater than the time threshold of appointment according to the page response time of request.If be greater than, illustrated and have the blind note leak of SQL.
A concrete grammar of local file inclusion test is, parameter value in URL is replaced with to "/etc/password ", then send URL request, in the page that judgement is returned according to request, whether comprise " root:x:0:0:root " character string, if comprised, explanation exists local file to comprise leak.
A concrete grammar of telefile inclusion test is, parameter value in URL is replaced with " http://www.***.com ", then send URL request, whether the page that judgement is returned according to request comprises " <title> using Baidu.com; you just know </title> ", if comprised, explanation exists telefile to comprise leak.
The concrete grammar that command execution detects is, parameter value in URL is replaced with to " ENV " order, then send URL request, check in the page returning according to request, whether to comprise " PATH=" and " HOME=", if comprised, there is command execution leak in explanation.
Should be understood that above-mentioned example is only for schematic.Those of ordinary skill in the art should be understood that except above-mentioned detection model also can increase arbitrarily other detection models.In addition, each detection model also can be used additive method to test.These modifications and variations all should be included in protection scope of the present invention.
Step S103, carries out safety evaluation according to Hole Detection information to website.
In one embodiment of the invention, according to the leak structure that detects output, utilize CVSS(Common Vulnerability Scoring System, universal safety leak evaluating system) leak is carried out to objective rational assessment, last comprehensive all leak appraisal result provide the assessment to web portal security.Concrete appraisal procedure can, with reference to prior art, be not described in detail herein.
According to the web portal security appraisal procedure of the embodiment of the present invention, at least there is following beneficial effect:
(1), by static page analysis being carried out in website and dynamic page is analyzed, improve the completeness that website crawls;
(2) by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting;
(3) use CVSS to assess leak, appraisal procedure is more reasonable;
(4) by the fail safe of website being made to rationally effectively assessment, making to carry survey person has better awareness and understanding to the fail safe of environment under line, and then can on purpose improve the safe condition of product.
Below in conjunction with accompanying drawing, describe in detail according to the web portal security evaluating system of the embodiment of the present invention.
A web portal security evaluating system, comprising: scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of website according to analysis result; Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And evaluation module, for safety evaluation being carried out in website according to Hole Detection information.
Fig. 2 is the structural representation of web portal security evaluating system according to an embodiment of the invention.As shown in Figure 2, this web portal security evaluating system comprises: scan module 100, detection module 200 and evaluation module 300.
Scan module 100 is for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and according to analysis result, obtains all derivation URL of website.Fig. 3 is the structural representation of an embodiment of scan module 100.As shown in Figure 3, scan module 100 can comprise judging unit 110, dynamic analysis unit 120 and URL acquiring unit 130.Judging unit 110 is for judging that the html page returning according to the basic URL of website is static page or dynamic page.Dynamic analysis unit 120, for when judging unit 110 determines that html page is dynamic page, carries out dynamic analysis to extract the dynamic URL of html page to html page.URL acquiring unit 130 is for when judging unit 130 determines that html page is static page, html page is carried out to static page analysis and obtain new URL, and while obtaining the dynamic URL of html page in dynamic analysis unit 120, according to dynamic URL, carry out static page analysis and obtain new URL.
Particularly, first, the html page that judging unit 110 judgements are returned according to basic URL is static page or dynamic page.If static page, directly by 130 pairs of html pages of URL acquiring unit, carrying out static page analysis obtains new URL.If first dynamic page carries out dynamic analysis to extract the dynamic URL of html page by 120 pairs of dynamic analysis unit html page, and then carries out static page analysis by URL acquiring unit according to dynamic URL and obtain new URL.Thus, realizing complete website crawls.
More specifically, in one embodiment of the invention, if html page contains <script> and/or </script> statement block, determine that html page is dynamic page; Or, if html page contains event attribute, determine that html page is dynamic page; Or, if the property value of html page note contains the pseudo-agreement of javascript, determine that html page is dynamic page.Should be understood that above-mentioned example, only for schematically, is not limited to the present invention.
Detection module 200, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, is exported Hole Detection information, wherein the corresponding application dimension of each detection model.Particularly, in one embodiment of the invention, a plurality of detection models can comprise that XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution detection etc.
More specifically, the concrete grammar that XSS detects is, in URL request, appends specific character string, and whether the page returning according to this URL request comprises this specific character string judges whether XSS is suspicious in website.If do not comprised, determine that this website does not comprise XSS leak; If comprised, determine that website is suspicious, further according to a malicious script dictionary, this URL is carried out to fuzz testing, by returning results of each fuzz testing, give browser engine and remove Dynamic Execution, if malicious script is carried out, determine that so this website exists XSS leak.
SQL injects the concrete grammar detecting, one group of test string is appended in URL request successively, in the page returning according to this URL request, whether comprises the relevant error burst of predefined database (as MySQL, ORACLE, MSSQL) and judge that website possibility exists SQL to inject.If do not comprised, determine that this website does not exist SQL to inject; If comprised, determine that website is suspicious, further according to positive and negative two test strings, this URL is tested to (be appended to URL parameter value after), the similarity of two back pages of judgement, if the similarity of the page surpasses threshold value (as 50%), explanation does not exist SQL to inject, otherwise explanation exists SQL to inject.
The concrete grammar that the blind note of SQL detects is, the SLEEP function dictionary of SQL is appended to respectively in the parameter of URL, then sends URL request, and whether judgement is greater than the time threshold of appointment according to the page response time of request.If be greater than, illustrated and have the blind note leak of SQL.
A concrete grammar of local file inclusion test is, parameter value in URL is replaced with to "/etc/password ", then send URL request, in the page that judgement is returned according to request, whether comprise " root:x:0:0:root " character string, if comprised, explanation exists local file to comprise leak.
A concrete grammar of telefile inclusion test is, parameter value in URL is replaced with " http://www.***.com ", then send URL request, whether the page that judgement is returned according to request comprises " <title> using Baidu.com; you just know </title> ", if comprised, explanation exists telefile to comprise leak.
The concrete grammar that command execution detects is, parameter value in URL is replaced with to " ENV " order, then send URL request, check in the page returning according to request, whether to comprise " PATH=" and " HOME=", if comprised, there is command execution leak in explanation.
Should be understood that above-mentioned example is only for schematic.Those of ordinary skill in the art should be understood that except above-mentioned detection model also can increase arbitrarily other detection models.In addition, each detection model also can be used additive method to test.These modifications and variations all should be included in protection scope of the present invention.
Evaluation module 300 is for carrying out security evaluation according to Hole Detection information to website.In one embodiment of the invention, according to the leak structure that detects output, utilize CVSS to carry out objective rational assessment to leak, last comprehensive all leak appraisal result provide the assessment to web portal security.
Web portal security evaluating system according to the embodiment of the present invention, at least has following beneficial effect:
(1), by static page analysis being carried out in website and dynamic page is analyzed, improve the completeness that website crawls;
(2) by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting;
(3) use CVSS to assess leak, appraisal procedure is more reasonable;
(4) by the fail safe of website being made to rationally effectively assessment, making to carry survey person has better awareness and understanding to the fail safe of environment under line, and then can on purpose improve the safe condition of product.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, a plurality of steps or method can realize with being stored in memory and by software or the firmware of suitable instruction execution system execution.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: have for data-signal being realized to the discrete logic of the logic gates of logic function, the application-specific integrated circuit (ASIC) with suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And the specific features of description, structure, material or feature can be with suitable mode combinations in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, for the ordinary skill in the art, be appreciated that without departing from the principles and spirit of the present invention and can carry out multiple variation, modification, replacement and modification to these embodiment, scope of the present invention is by claims and be equal to and limit.
Claims (10)
1. a web portal security appraisal procedure, is characterized in that, comprises the following steps:
S1: carry out dynamic page analysis or static page analysis according to the basic URL of website, and obtain all derivation URL of described website according to analysis result;
S2: use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And
S3: safety evaluation is carried out in described website according to described Hole Detection information.
2. web portal security appraisal procedure according to claim 1, is characterized in that, described step S1 specifically comprises:
The html page that judgement is returned according to described basic URL is static page or dynamic page;
If described html page is static page, directly described html page is carried out to static page analysis obtains new URL;
If described html page is dynamic page, described html page is carried out to dynamic analysis to extract the dynamic URL of described html page, and carry out static page analysis to obtain new URL according to described dynamic URL.
3. web portal security appraisal procedure according to claim 2, is characterized in that, the html page that described judgement URL request is returned is that static page or dynamic page specifically comprise:
If described html page contains <script> and/or </script> statement block, determine that described html page is dynamic page;
If described html page contains event attribute, determine that described html page is dynamic page;
If the property value of described html page note contains the pseudo-agreement of javascript, determine that described html page is dynamic page.
4. web portal security appraisal procedure according to claim 1, is characterized in that, described a plurality of detection models comprise: XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution and detects.
5. web portal security appraisal procedure according to claim 1, is characterized in that, described step S3 specifically comprises:
According to the information of described Hole Detection, use universal safety leak evaluating system to carry out safety evaluation to website.
6. a web portal security evaluating system, is characterized in that, comprising:
Scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of described website according to analysis result;
Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And
Evaluation module, for carrying out safety evaluation according to described Hole Detection information to described website.
7. web portal security evaluating system according to claim 6, is characterized in that, described scan module specifically comprises:
Judging unit, for judging that the html page returning according to described basic URL is static page or dynamic page;
Dynamic analysis unit, for when described judging unit determines that described html page is dynamic page, carries out dynamic analysis to extract the dynamic URL of described html page to described html page;
URL acquiring unit, for when described judging unit determines that described html page is static page, described html page is carried out to static page analysis and obtain new URL, and while obtaining the dynamic URL of described html page in described dynamic analysis unit, according to described dynamic URL, carry out static page analysis and obtain new URL.
8. web portal security evaluating system according to claim 7, is characterized in that, the html page that described judging unit judgement URL request is returned is that static page or dynamic page specifically comprise:
If described html page contains <script> and/or </script> statement block, determine that described html page is dynamic page;
If described html page contains event attribute, determine that described html page is dynamic page;
If the property value of described html page note contains the pseudo-agreement of javascript, determine that described html page is dynamic page.
9. web portal security evaluating system according to claim 6, is characterized in that, described predetermined detection model comprises: XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution and detects.
10. web portal security evaluating system according to claim 6, is characterized in that, described evaluation module, according to the result of described Hole Detection, is used universal safety leak evaluating system to carry out safety evaluation to website.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210345714.7A CN103685189A (en) | 2012-09-17 | 2012-09-17 | Website security evaluation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210345714.7A CN103685189A (en) | 2012-09-17 | 2012-09-17 | Website security evaluation method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103685189A true CN103685189A (en) | 2014-03-26 |
Family
ID=50321516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210345714.7A Pending CN103685189A (en) | 2012-09-17 | 2012-09-17 | Website security evaluation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685189A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104978523A (en) * | 2014-11-06 | 2015-10-14 | 哈尔滨安天科技股份有限公司 | Malicious sample capture method and system based on network hot word recognition |
CN105095260A (en) * | 2014-05-08 | 2015-11-25 | 广州爱九游信息技术有限公司 | Webpage processing method and device aiming at search engine optimization |
CN105391729A (en) * | 2015-11-30 | 2016-03-09 | 中国航天科工集团第二研究院七〇六所 | Web loophole automatic mining method based on fuzzy test |
CN105430002A (en) * | 2015-12-18 | 2016-03-23 | 北京奇虎科技有限公司 | Vulnerability detection method and device |
CN105631340A (en) * | 2015-12-17 | 2016-06-01 | 珠海市君天电子科技有限公司 | XSS vulnerability detection method and device |
CN105678170A (en) * | 2016-01-05 | 2016-06-15 | 广东工业大学 | Method for dynamically detecting cross site scripting (XSS) bugs |
CN107292178A (en) * | 2017-05-12 | 2017-10-24 | 北京计算机技术及应用研究所 | A kind of security breaches based on multi-level factor of influence threaten quantization method |
CN107623695A (en) * | 2017-09-30 | 2018-01-23 | 亚数信息科技(上海)有限公司 | HTTPS web page resources safety evaluation method and equipment |
WO2020000748A1 (en) * | 2018-06-30 | 2020-01-02 | 平安科技(深圳)有限公司 | File detection method and apparatus |
CN111478899A (en) * | 2020-04-03 | 2020-07-31 | 大汉软件股份有限公司 | Website trojan and lottery page identification method and system based on watermarks |
CN112039877A (en) * | 2020-08-28 | 2020-12-04 | 四川长虹电器股份有限公司 | KLD-based storage type XSS injection detection method |
CN112784141A (en) * | 2019-10-23 | 2021-05-11 | 腾讯科技(深圳)有限公司 | Search result quality determination method and device, storage medium and computer equipment |
CN113676460A (en) * | 2021-07-28 | 2021-11-19 | 清华大学 | Web application vulnerability integrated scanning method and system |
CN117454881A (en) * | 2023-12-19 | 2024-01-26 | 戎行技术有限公司 | Website dynamic tag analysis method based on static page |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080077556A1 (en) * | 2006-09-23 | 2008-03-27 | Juan Carlos Muriente | System and method for applying real-time optimization of internet websites for improved search engine positioning |
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN102254111A (en) * | 2010-05-17 | 2011-11-23 | 北京知道创宇信息技术有限公司 | Malicious site detection method and device |
CN102262635A (en) * | 2010-05-25 | 2011-11-30 | 北京启明星辰信息技术股份有限公司 | Page crawler system and page crawler method |
-
2012
- 2012-09-17 CN CN201210345714.7A patent/CN103685189A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080077556A1 (en) * | 2006-09-23 | 2008-03-27 | Juan Carlos Muriente | System and method for applying real-time optimization of internet websites for improved search engine positioning |
CN101964025A (en) * | 2009-07-23 | 2011-02-02 | 中联绿盟信息技术(北京)有限公司 | XSS (Cross Site Scripting) detection method and device |
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
CN102254111A (en) * | 2010-05-17 | 2011-11-23 | 北京知道创宇信息技术有限公司 | Malicious site detection method and device |
CN102262635A (en) * | 2010-05-25 | 2011-11-30 | 北京启明星辰信息技术股份有限公司 | Page crawler system and page crawler method |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095260A (en) * | 2014-05-08 | 2015-11-25 | 广州爱九游信息技术有限公司 | Webpage processing method and device aiming at search engine optimization |
CN105095260B (en) * | 2014-05-08 | 2017-03-29 | 广州爱九游信息技术有限公司 | For the web page processing method and device of search engine optimization |
CN104978523A (en) * | 2014-11-06 | 2015-10-14 | 哈尔滨安天科技股份有限公司 | Malicious sample capture method and system based on network hot word recognition |
CN105391729A (en) * | 2015-11-30 | 2016-03-09 | 中国航天科工集团第二研究院七〇六所 | Web loophole automatic mining method based on fuzzy test |
CN105631340B (en) * | 2015-12-17 | 2019-01-18 | 珠海豹趣科技有限公司 | A kind of method and device of XSS Hole Detection |
CN105631340A (en) * | 2015-12-17 | 2016-06-01 | 珠海市君天电子科技有限公司 | XSS vulnerability detection method and device |
CN105430002A (en) * | 2015-12-18 | 2016-03-23 | 北京奇虎科技有限公司 | Vulnerability detection method and device |
CN105678170A (en) * | 2016-01-05 | 2016-06-15 | 广东工业大学 | Method for dynamically detecting cross site scripting (XSS) bugs |
CN105678170B (en) * | 2016-01-05 | 2018-05-29 | 广东工业大学 | A kind of method of dynamic detection XSS loopholes |
CN107292178A (en) * | 2017-05-12 | 2017-10-24 | 北京计算机技术及应用研究所 | A kind of security breaches based on multi-level factor of influence threaten quantization method |
CN107292178B (en) * | 2017-05-12 | 2020-12-01 | 北京计算机技术及应用研究所 | Security vulnerability threat quantification method based on multi-level influence factors |
CN107623695A (en) * | 2017-09-30 | 2018-01-23 | 亚数信息科技(上海)有限公司 | HTTPS web page resources safety evaluation method and equipment |
WO2020000748A1 (en) * | 2018-06-30 | 2020-01-02 | 平安科技(深圳)有限公司 | File detection method and apparatus |
CN112784141B (en) * | 2019-10-23 | 2023-10-31 | 腾讯科技(深圳)有限公司 | Search result quality determination method, apparatus, storage medium and computer device |
CN112784141A (en) * | 2019-10-23 | 2021-05-11 | 腾讯科技(深圳)有限公司 | Search result quality determination method and device, storage medium and computer equipment |
CN111478899A (en) * | 2020-04-03 | 2020-07-31 | 大汉软件股份有限公司 | Website trojan and lottery page identification method and system based on watermarks |
CN112039877A (en) * | 2020-08-28 | 2020-12-04 | 四川长虹电器股份有限公司 | KLD-based storage type XSS injection detection method |
CN112039877B (en) * | 2020-08-28 | 2022-04-01 | 四川长虹电器股份有限公司 | KLD-based storage type XSS injection detection method |
CN113676460B (en) * | 2021-07-28 | 2022-07-22 | 清华大学 | Web application vulnerability integrated scanning method, system, electronic equipment and storage medium |
CN113676460A (en) * | 2021-07-28 | 2021-11-19 | 清华大学 | Web application vulnerability integrated scanning method and system |
CN117454881A (en) * | 2023-12-19 | 2024-01-26 | 戎行技术有限公司 | Website dynamic tag analysis method based on static page |
CN117454881B (en) * | 2023-12-19 | 2024-03-08 | 戎行技术有限公司 | Website dynamic tag analysis method based on static page |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685189A (en) | Website security evaluation method and system | |
CN101964025B (en) | XSS detection method and equipment | |
Junjin | An approach for SQL injection vulnerability detection | |
KR101060639B1 (en) | Javascript obfuscation strength of suspected infection site through the detection system and the detection method | |
CN109165507B (en) | Cross-site scripting attack vulnerability detection method and device and terminal equipment | |
CN104301302A (en) | Unauthorized attack detection method and device | |
CN103279710B (en) | Method and system for detecting malicious codes of Internet information system | |
CN102739675B (en) | Website security detection method and device | |
Djuric | A black-box testing tool for detecting SQL injection vulnerabilities | |
CN103645978A (en) | Method, device and system for testing browser webpage loading time | |
CN104184728A (en) | Safety detection method and device for Web application system | |
US8572747B2 (en) | Policy-driven detection and verification of methods such as sanitizers and validators | |
Rocha et al. | Etssdetector: A tool to automatically detect cross-site scripting vulnerabilities | |
CN106909846B (en) | Vulnerability detection method and device based on virtual analysis | |
CN104303189A (en) | Determining application vulnerabilities | |
CN113158197B (en) | SQL injection vulnerability detection method and system based on active IAST | |
CN110460612A (en) | Safety detecting method, equipment, storage medium and device | |
CN103001946A (en) | Website security detection method, website security detection equipment and website security detection system | |
Mohammed | Assessment of web scanner tools | |
CN105404816A (en) | Content-based vulnerability detection method and device | |
CN111064735B (en) | SQL injection vulnerability detection method and system for power information system | |
CN103902912A (en) | Method and device for detecting web page vulnerability | |
CN103324890A (en) | Method and device for detecting vulnerable local files of links | |
CN115952503A (en) | Application safety testing method and system integrating black, white and gray safety detection technology | |
CN106603572B (en) | Vulnerability detection method and device based on probe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140326 |