首页 | 本学科首页   官方微博 | 高级检索  
     

Web应用SQL注入漏洞分析及防御研究
引用本文:李明.Web应用SQL注入漏洞分析及防御研究[J].福建电脑,2020(5):25-27.
作者姓名:李明
作者单位:福建幼儿师范高等专科学校人文科学系
基金项目:福建幼儿师范高等专科学校校级课题基金(No.2016C05)资助。
摘    要:基于Web的互联网应用蓬勃发展。Web应用在每个人的日常生活中扮演着重要的角色,积聚了大量的用户信息和数据,引起了黑客们的广泛关注。这使得Web应用的安全形势日渐严峻。保障Web应用程序和用户数据安全关系重大,本文对存在范围广、威胁程度高的SQL注入攻击进行了论述,分析了SQL注入攻击的机理及可能造成的危害,探讨了发现SQL注入攻击的方法以及如何实施防御措施,以期为Web应用安全性能的提升、为开发人员、网络安全工作者提供参考。

关 键 词:Web应用漏洞  SQL注入  防御措施

Analysis and Defense of SQL Injection Vulnerability in Web Applications
LI Ming.Analysis and Defense of SQL Injection Vulnerability in Web Applications[J].Fujian Computer,2020(5):25-27.
Authors:LI Ming
Affiliation:(Department of Humanities and Sciences,Fujian Preschool Education College,Fuzhou,China,350007)
Abstract:With the vigorous development of Web-based Internet applications, Web applications play an important role in our everyday life, gathering a large number of user information and data, which attracts extensive attention of hackers and makes the security situation of Web applications increasingly severe. Safeguarding the security of Web applications and user data is of great importance. Under the background, we studies the SQL injection attacks that has wide range and high threat, analyses the mechanism of SQL injection attack and its possible hazards. The methods of discovering SQL injection attacks and defense measures are also discussed in the hope of improving the security performance of Web applications and providing reference for developers and network security workers.
Keywords:Web Application Vulnerability  SQL Injection  Defensive Measures
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号