Font Size: a A A

Design And Implementation Of The Security Protection System In Website Front-End Attack

Posted on:2020-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z F XuFull Text:PDF
GTID:2428330602459047Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of network and information technology,new technology and new application of the continuous update and popularization,the website system has become one of the main components of China's cyberspace.Website system,as the entrance of the whole network,has gradually become the primary target of hackers.As a hacker attack on a network update and weapons and iterative,coupled with a steady,attack and prevent most of existing attack on web front-end protection system focused on the static defense,to new way of network attack defensive ability is insufficient,network operators face the severe challenge,for web front end safety protection system of research and practice is a "normal" theme.Therefore,this thesis carried out the following research work in view of the above situation :(1)The research status quo and existing problems of front-end attack and defense technology of the website were comprehensively summarized and analyzed,and the principles,attack methods and defense strategies of SQL injection vulnerability and file uploading vulnerability were studied.(2)Based on the perspective of network attack,defense and confrontation,this paper proposes a set of overall architecture of the front end attack protection system,including the system architecture and function module design,and puts forward the strategy model of website security administrator against hacker attack.(3)Detailed design and implementation of each functional module and component included in the system,including: SQL injection protection subsystem,file upload protection subsystem,back-end detection and blocking subsystem.(4)Finally,the testing fully proves that the system in this paper,the design of the website front against the effectiveness of the protection system functions,site security administrator can use this system based on network attack and defense game strategy at every stage of the hacker attacks effectively resist,implement site exposed surface convergence,front-end attack protection,back-end security detection and attack directly counter.
Keywords/Search Tags:Network security, Hacker, Malicious Code, The WEB container
PDF Full Text Request
Related items