Font Size: a A A

The Technology Of Browser Security Access And Fingerprint Identification

Posted on:2013-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:M Y ZhangFull Text:PDF
GTID:2218330371457337Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of Internet, its coverage becomes wider and its services are more diverse, so the dependence of information society on Internet gets further enhanced. Meanwhile, the emergence of new applications and the introduction of new technologies bring more serious security issues. Web-based attacks continue to be the major means of attacks and browser's own security problems have become increasingly prominent; Internet users pay more attention to privacy information disclosure when they surf the Internet with the browser. This paper focuses on some key technologies in Internet security threats, including the security browser structure model and the browser fingerprint identification model.A Security Label Algorithm based on Browser Object's Multi-level Attributes is proposed which adopts modularized design as the mainstream modern browser (i.e. Chrome) Concentrating on SOP (Same Origin Policy) strategy deficiencies, the new structure firstly designs a new objects granularity division method. Each object owns a security attribute label consisting of multiple security properties. A security attribute label needs to consider its security properties weights and calculate its trust value to implement access control. This design solves the dilemma of SOP granularity division, successfully caters for the current technology (i.e. Mashup) and prevents the malicious attacks that launched inside objects (i.e. XSS attacks).The maturity of the browser fingerprint technology brings about significant impact on private policies and technological designs. The browser fingerprints recognition algorithm is proposed based on the browser characterized information entropy in this section. Firstly, diversity and stability are the two problems that have to be considered in the fingerprints construction with browser characterized information. Then, based on the representation of the browser fingerprint information entropy, the two algorithms are proposed, one is the browser fingerprint recognition algorithm and another is the fingerprint updated algorithm with small changed information. Finally, some supplemental discussions are given.
Keywords/Search Tags:Web security, Browser, SOP, Multi-level, Security label, Browser fingerprint
PDF Full Text Request
Related items