CN103685189A - Website security evaluation method and system - Google Patents

Website security evaluation method and system Download PDF

Info

Publication number
CN103685189A
CN103685189A CN201210345714.7A CN201210345714A CN103685189A CN 103685189 A CN103685189 A CN 103685189A CN 201210345714 A CN201210345714 A CN 201210345714A CN 103685189 A CN103685189 A CN 103685189A
Authority
CN
China
Prior art keywords
page
url
dynamic
website
html page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210345714.7A
Other languages
Chinese (zh)
Inventor
计东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201210345714.7A priority Critical patent/CN103685189A/en
Publication of CN103685189A publication Critical patent/CN103685189A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a website security evaluation method and a website security evaluation system. The method comprises the following steps: performing dynamic webpage analysis or static webpage analysis according to a basic URL (Uniform Resource Locator) of a website, and acquiring all derived URLs of the website according to analysis result; performing loophole detection on webpages corresponding to all derived URLs of the website by using a plurality of detection models, and outputting loophole detection information, wherein each detection model corresponds to one application dimension; performing security evaluation on the website according to the loophole detection information. According to the method, all URL links of the website can be completely acquired through dynamic webpage analysis and static webpage analysis on the website, and meanwhile loopholes can be automatically detected through a plurality of preset detection models, the accuracy and the efficiency in detection are improved, and the website security evaluation can be efficiently and accurately achieved.

Description

Web portal security appraisal procedure and system
Technical field
The present invention relates to Internet technical field, relate in particular to a kind of web portal security appraisal procedure and system.
Background technology
At present, the appraisal procedure of web portal security and system are relatively less, and the feasibility of current existing appraisal procedure is poor, cannot to the fail safe of website, assess accurately and efficiently.Therefore, need a kind of method and system of can efficiently and accurately, reasonably web portal security being assessed badly.
Summary of the invention
The present invention is intended at least one of solve the problems of the technologies described above.
For this reason, one object of the present invention is to propose a kind of web portal security appraisal procedure that can assess the fail safe of website accurately and efficiently.
Another object of the present invention is to propose a kind of web portal security evaluating system.
To achieve these goals, the web portal security appraisal procedure of embodiment according to a first aspect of the invention, comprise the following steps: according to the basic URL of website, carry out dynamic page analysis or static page analysis, and according to analysis result, obtain all derivation URL of described website; Use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, export all Hole Detection information, wherein the corresponding application dimension of each detection model; And according to the information of described Hole Detection, security evaluation is carried out in described website.
According to the web portal security appraisal procedure of the embodiment of the present invention, by dynamic page analysis being carried out in website and static page is analyzed, can obtain imperfectly all URL links of website; Simultaneously, by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting, thereby realize the web portal security assessment of efficiently and accurately, thus the fail safe of environment under line is had to better awareness and understanding, and then safe condition that can autotelic improvement product.
To achieve these goals, the web portal security evaluating system of embodiment according to a second aspect of the invention, comprise: scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of described website according to analysis result; Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And evaluation module, for safety evaluation being carried out in described website according to described Hole Detection information.
According to the web portal security evaluating system of the embodiment of the present invention,, by dynamic page analysis being carried out in website and static page is analyzed, can obtain imperfectly all URL links of website; Simultaneously, by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting, thereby realize the web portal security assessment of efficiently and accurately, thus the fail safe of environment under line is had to better awareness and understanding, and then safe condition that can autotelic improvement product.
The aspect that the present invention is additional and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Accompanying drawing explanation
Above-mentioned and/or the additional aspect of the present invention and advantage will become from the following description of the accompanying drawings of embodiments and obviously and easily understand, wherein,
Fig. 1 is the flow chart of web portal security appraisal procedure according to an embodiment of the invention;
Fig. 2 is the structural representation of web portal security evaluating system according to an embodiment of the invention; And
Fig. 3 is the structural representation of an embodiment of the scan module in Fig. 2.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Below by the embodiment being described with reference to the drawings, be exemplary, only for explaining the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise spirit and all changes within the scope of intension, modification and the equivalent that falls into additional claims.
In description of the invention, it will be appreciated that, term " first ", " second " etc. are only for describing object, and can not be interpreted as indication or hint relative importance.In description of the invention, it should be noted that, unless otherwise clearly defined and limited, term " is connected ", " connection " should be interpreted broadly, and for example, can be to be fixedly connected with, and can be also to removably connect, or connects integratedly; Can be mechanical connection, can be to be also electrically connected to; Can be to be directly connected, also can indirectly be connected by intermediary.For the ordinary skill in the art, can concrete condition understand above-mentioned term concrete meaning in the present invention.In addition,, in description of the invention, except as otherwise noted, the implication of " a plurality of " is two or more.
In flow chart or any process of otherwise describing at this or method describe and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of the step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Below with reference to accompanying drawing, describe according to the web portal security appraisal procedure of the embodiment of the present invention.
A web portal security appraisal procedure, comprises the following steps: according to the basic URL of website, carry out dynamic page analysis or static page analysis, and according to analysis result, obtain all derivation URL of website; Use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, export all Hole Detection information, wherein the corresponding application dimension of each detection model; And according to the information of Hole Detection, security evaluation is carried out in website.
Fig. 1 is the flow chart of web portal security appraisal procedure according to an embodiment of the invention.
As shown in Figure 1, according to the web portal security appraisal procedure of the embodiment of the present invention, comprise the steps.
Step S101, carries out dynamic page analysis or static page analysis according to the basic URL of website, and according to analysis result, obtains all derivation URL of website.
Particularly, the html page that first judgement is returned according to basic URL is static page or dynamic page.Static page if, directly html page is carried out to static page analysis obtains new URL.Dynamic page, first carries out dynamic analysis (being mainly to resolve by JS engine) to extract the dynamic URL of the page to html page if, then according to dynamic URL, carries out static page analysis and obtain new URL.Wherein, the process that static page is analyzed can, with reference to prior art, be not described in detail herein.
More specifically, if html page contains <script> and/or </script> statement block, determine that html page is dynamic page; Or, if html page contains event attribute, determine that html page is dynamic page; Or, if the property value of html page note contains the pseudo-agreement of javascript, determine that html page is dynamic page.Should be understood that above-mentioned example, only for schematically, is not limited to the present invention.
Step S102, is used a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, output Hole Detection information, the wherein corresponding application dimension of each detection model.
Particularly, in one embodiment of the invention, web portal security is divided to detection model corresponding to each application dimension from application dimension.That is to say, different detection method corresponding to leak kind, or the parsing of the static page, or dynamic attack detecting, finally export all leaks.Wherein, a plurality of detection models can comprise that XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution detection etc.
More specifically, the concrete grammar that XSS detects is, in URL request, appends specific character string, and whether the page returning according to this URL request comprises this specific character string judges whether XSS is suspicious in website.If do not comprised, determine that this website does not comprise XSS leak; If comprised, determine that website is suspicious, further according to a malicious script dictionary, this URL is carried out to fuzz testing, by returning results of each fuzz testing, give browser engine and remove Dynamic Execution, if malicious script is carried out, determine that so this website exists XSS leak.
SQL injects the concrete grammar detecting, one group of test string is appended in URL request successively, in the page returning according to this URL request, whether comprises the relevant error burst of predefined database (as MySQL, ORACLE, MSSQL) and judge that website possibility exists SQL to inject.If do not comprised, determine that this website does not exist SQL to inject; If comprised, determine that website is suspicious, further according to positive and negative two test strings, this URL is tested to (be appended to URL parameter value after), the similarity of two back pages of judgement, if the similarity of the page surpasses threshold value (as 50%), explanation does not exist SQL to inject, otherwise explanation exists SQL to inject.
The concrete grammar that the blind note of SQL detects is, the SLEEP function dictionary of SQL is appended to respectively in the parameter of URL, then sends URL request, and whether judgement is greater than the time threshold of appointment according to the page response time of request.If be greater than, illustrated and have the blind note leak of SQL.
A concrete grammar of local file inclusion test is, parameter value in URL is replaced with to "/etc/password ", then send URL request, in the page that judgement is returned according to request, whether comprise " root:x:0:0:root " character string, if comprised, explanation exists local file to comprise leak.
A concrete grammar of telefile inclusion test is, parameter value in URL is replaced with " http://www.baidu.com ", then send URL request, whether the page that judgement is returned according to request comprises " <title> using Baidu.com; you just know </title> ", if comprised, explanation exists telefile to comprise leak.
The concrete grammar that command execution detects is, parameter value in URL is replaced with to " ENV " order, then send URL request, check in the page returning according to request, whether to comprise " PATH=" and " HOME=", if comprised, there is command execution leak in explanation.
Should be understood that above-mentioned example is only for schematic.Those of ordinary skill in the art should be understood that except above-mentioned detection model also can increase arbitrarily other detection models.In addition, each detection model also can be used additive method to test.These modifications and variations all should be included in protection scope of the present invention.
Step S103, carries out safety evaluation according to Hole Detection information to website.
In one embodiment of the invention, according to the leak structure that detects output, utilize CVSS(Common Vulnerability Scoring System, universal safety leak evaluating system) leak is carried out to objective rational assessment, last comprehensive all leak appraisal result provide the assessment to web portal security.Concrete appraisal procedure can, with reference to prior art, be not described in detail herein.
According to the web portal security appraisal procedure of the embodiment of the present invention, at least there is following beneficial effect:
(1), by static page analysis being carried out in website and dynamic page is analyzed, improve the completeness that website crawls;
(2) by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting;
(3) use CVSS to assess leak, appraisal procedure is more reasonable;
(4) by the fail safe of website being made to rationally effectively assessment, making to carry survey person has better awareness and understanding to the fail safe of environment under line, and then can on purpose improve the safe condition of product.
Below in conjunction with accompanying drawing, describe in detail according to the web portal security evaluating system of the embodiment of the present invention.
A web portal security evaluating system, comprising: scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of website according to analysis result; Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And evaluation module, for safety evaluation being carried out in website according to Hole Detection information.
Fig. 2 is the structural representation of web portal security evaluating system according to an embodiment of the invention.As shown in Figure 2, this web portal security evaluating system comprises: scan module 100, detection module 200 and evaluation module 300.
Scan module 100 is for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and according to analysis result, obtains all derivation URL of website.Fig. 3 is the structural representation of an embodiment of scan module 100.As shown in Figure 3, scan module 100 can comprise judging unit 110, dynamic analysis unit 120 and URL acquiring unit 130.Judging unit 110 is for judging that the html page returning according to the basic URL of website is static page or dynamic page.Dynamic analysis unit 120, for when judging unit 110 determines that html page is dynamic page, carries out dynamic analysis to extract the dynamic URL of html page to html page.URL acquiring unit 130 is for when judging unit 130 determines that html page is static page, html page is carried out to static page analysis and obtain new URL, and while obtaining the dynamic URL of html page in dynamic analysis unit 120, according to dynamic URL, carry out static page analysis and obtain new URL.
Particularly, first, the html page that judging unit 110 judgements are returned according to basic URL is static page or dynamic page.If static page, directly by 130 pairs of html pages of URL acquiring unit, carrying out static page analysis obtains new URL.If first dynamic page carries out dynamic analysis to extract the dynamic URL of html page by 120 pairs of dynamic analysis unit html page, and then carries out static page analysis by URL acquiring unit according to dynamic URL and obtain new URL.Thus, realizing complete website crawls.
More specifically, in one embodiment of the invention, if html page contains <script> and/or </script> statement block, determine that html page is dynamic page; Or, if html page contains event attribute, determine that html page is dynamic page; Or, if the property value of html page note contains the pseudo-agreement of javascript, determine that html page is dynamic page.Should be understood that above-mentioned example, only for schematically, is not limited to the present invention.
Detection module 200, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of website, is exported Hole Detection information, wherein the corresponding application dimension of each detection model.Particularly, in one embodiment of the invention, a plurality of detection models can comprise that XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution detection etc.
More specifically, the concrete grammar that XSS detects is, in URL request, appends specific character string, and whether the page returning according to this URL request comprises this specific character string judges whether XSS is suspicious in website.If do not comprised, determine that this website does not comprise XSS leak; If comprised, determine that website is suspicious, further according to a malicious script dictionary, this URL is carried out to fuzz testing, by returning results of each fuzz testing, give browser engine and remove Dynamic Execution, if malicious script is carried out, determine that so this website exists XSS leak.
SQL injects the concrete grammar detecting, one group of test string is appended in URL request successively, in the page returning according to this URL request, whether comprises the relevant error burst of predefined database (as MySQL, ORACLE, MSSQL) and judge that website possibility exists SQL to inject.If do not comprised, determine that this website does not exist SQL to inject; If comprised, determine that website is suspicious, further according to positive and negative two test strings, this URL is tested to (be appended to URL parameter value after), the similarity of two back pages of judgement, if the similarity of the page surpasses threshold value (as 50%), explanation does not exist SQL to inject, otherwise explanation exists SQL to inject.
The concrete grammar that the blind note of SQL detects is, the SLEEP function dictionary of SQL is appended to respectively in the parameter of URL, then sends URL request, and whether judgement is greater than the time threshold of appointment according to the page response time of request.If be greater than, illustrated and have the blind note leak of SQL.
A concrete grammar of local file inclusion test is, parameter value in URL is replaced with to "/etc/password ", then send URL request, in the page that judgement is returned according to request, whether comprise " root:x:0:0:root " character string, if comprised, explanation exists local file to comprise leak.
A concrete grammar of telefile inclusion test is, parameter value in URL is replaced with " http://www.baidu.com ", then send URL request, whether the page that judgement is returned according to request comprises " <title> using Baidu.com; you just know </title> ", if comprised, explanation exists telefile to comprise leak.
The concrete grammar that command execution detects is, parameter value in URL is replaced with to " ENV " order, then send URL request, check in the page returning according to request, whether to comprise " PATH=" and " HOME=", if comprised, there is command execution leak in explanation.
Should be understood that above-mentioned example is only for schematic.Those of ordinary skill in the art should be understood that except above-mentioned detection model also can increase arbitrarily other detection models.In addition, each detection model also can be used additive method to test.These modifications and variations all should be included in protection scope of the present invention.
Evaluation module 300 is for carrying out security evaluation according to Hole Detection information to website.In one embodiment of the invention, according to the leak structure that detects output, utilize CVSS to carry out objective rational assessment to leak, last comprehensive all leak appraisal result provide the assessment to web portal security.
Web portal security evaluating system according to the embodiment of the present invention, at least has following beneficial effect:
(1), by static page analysis being carried out in website and dynamic page is analyzed, improve the completeness that website crawls;
(2) by default a plurality of detection models, leak is detected automatically, improve the Accuracy and high efficiency detecting;
(3) use CVSS to assess leak, appraisal procedure is more reasonable;
(4) by the fail safe of website being made to rationally effectively assessment, making to carry survey person has better awareness and understanding to the fail safe of environment under line, and then can on purpose improve the safe condition of product.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, a plurality of steps or method can realize with being stored in memory and by software or the firmware of suitable instruction execution system execution.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: have for data-signal being realized to the discrete logic of the logic gates of logic function, the application-specific integrated circuit (ASIC) with suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And the specific features of description, structure, material or feature can be with suitable mode combinations in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, for the ordinary skill in the art, be appreciated that without departing from the principles and spirit of the present invention and can carry out multiple variation, modification, replacement and modification to these embodiment, scope of the present invention is by claims and be equal to and limit.

Claims (10)

1. a web portal security appraisal procedure, is characterized in that, comprises the following steps:
S1: carry out dynamic page analysis or static page analysis according to the basic URL of website, and obtain all derivation URL of described website according to analysis result;
S2: use a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And
S3: safety evaluation is carried out in described website according to described Hole Detection information.
2. web portal security appraisal procedure according to claim 1, is characterized in that, described step S1 specifically comprises:
The html page that judgement is returned according to described basic URL is static page or dynamic page;
If described html page is static page, directly described html page is carried out to static page analysis obtains new URL;
If described html page is dynamic page, described html page is carried out to dynamic analysis to extract the dynamic URL of described html page, and carry out static page analysis to obtain new URL according to described dynamic URL.
3. web portal security appraisal procedure according to claim 2, is characterized in that, the html page that described judgement URL request is returned is that static page or dynamic page specifically comprise:
If described html page contains <script> and/or </script> statement block, determine that described html page is dynamic page;
If described html page contains event attribute, determine that described html page is dynamic page;
If the property value of described html page note contains the pseudo-agreement of javascript, determine that described html page is dynamic page.
4. web portal security appraisal procedure according to claim 1, is characterized in that, described a plurality of detection models comprise: XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution and detects.
5. web portal security appraisal procedure according to claim 1, is characterized in that, described step S3 specifically comprises:
According to the information of described Hole Detection, use universal safety leak evaluating system to carry out safety evaluation to website.
6. a web portal security evaluating system, is characterized in that, comprising:
Scan module, for carrying out dynamic page analysis or static page analysis according to the basic URL of website, and obtains all derivation URL of described website according to analysis result;
Detection module, for using a plurality of detection models to carry out Hole Detection to the webpage corresponding to all derivation URL of described website, output Hole Detection information, the wherein corresponding application dimension of each detection model; And
Evaluation module, for carrying out safety evaluation according to described Hole Detection information to described website.
7. web portal security evaluating system according to claim 6, is characterized in that, described scan module specifically comprises:
Judging unit, for judging that the html page returning according to described basic URL is static page or dynamic page;
Dynamic analysis unit, for when described judging unit determines that described html page is dynamic page, carries out dynamic analysis to extract the dynamic URL of described html page to described html page;
URL acquiring unit, for when described judging unit determines that described html page is static page, described html page is carried out to static page analysis and obtain new URL, and while obtaining the dynamic URL of described html page in described dynamic analysis unit, according to described dynamic URL, carry out static page analysis and obtain new URL.
8. web portal security evaluating system according to claim 7, is characterized in that, the html page that described judging unit judgement URL request is returned is that static page or dynamic page specifically comprise:
If described html page contains <script> and/or </script> statement block, determine that described html page is dynamic page;
If described html page contains event attribute, determine that described html page is dynamic page;
If the property value of described html page note contains the pseudo-agreement of javascript, determine that described html page is dynamic page.
9. web portal security evaluating system according to claim 6, is characterized in that, described predetermined detection model comprises: XSS detects, SQL injects detection, the blind note detection of SQL, local file inclusion test, telefile inclusion test and command execution and detects.
10. web portal security evaluating system according to claim 6, is characterized in that, described evaluation module, according to the result of described Hole Detection, is used universal safety leak evaluating system to carry out safety evaluation to website.
CN201210345714.7A 2012-09-17 2012-09-17 Website security evaluation method and system Pending CN103685189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210345714.7A CN103685189A (en) 2012-09-17 2012-09-17 Website security evaluation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210345714.7A CN103685189A (en) 2012-09-17 2012-09-17 Website security evaluation method and system

Publications (1)

Publication Number Publication Date
CN103685189A true CN103685189A (en) 2014-03-26

Family

ID=50321516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210345714.7A Pending CN103685189A (en) 2012-09-17 2012-09-17 Website security evaluation method and system

Country Status (1)

Country Link
CN (1) CN103685189A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978523A (en) * 2014-11-06 2015-10-14 哈尔滨安天科技股份有限公司 Malicious sample capture method and system based on network hot word recognition
CN105095260A (en) * 2014-05-08 2015-11-25 广州爱九游信息技术有限公司 Webpage processing method and device aiming at search engine optimization
CN105391729A (en) * 2015-11-30 2016-03-09 中国航天科工集团第二研究院七〇六所 Web loophole automatic mining method based on fuzzy test
CN105430002A (en) * 2015-12-18 2016-03-23 北京奇虎科技有限公司 Vulnerability detection method and device
CN105631340A (en) * 2015-12-17 2016-06-01 珠海市君天电子科技有限公司 XSS vulnerability detection method and device
CN105678170A (en) * 2016-01-05 2016-06-15 广东工业大学 Method for dynamically detecting cross site scripting (XSS) bugs
CN107292178A (en) * 2017-05-12 2017-10-24 北京计算机技术及应用研究所 A kind of security breaches based on multi-level factor of influence threaten quantization method
CN107623695A (en) * 2017-09-30 2018-01-23 亚数信息科技(上海)有限公司 HTTPS web page resources safety evaluation method and equipment
WO2020000748A1 (en) * 2018-06-30 2020-01-02 平安科技(深圳)有限公司 File detection method and apparatus
CN111478899A (en) * 2020-04-03 2020-07-31 大汉软件股份有限公司 Website trojan and lottery page identification method and system based on watermarks
CN112039877A (en) * 2020-08-28 2020-12-04 四川长虹电器股份有限公司 KLD-based storage type XSS injection detection method
CN112784141A (en) * 2019-10-23 2021-05-11 腾讯科技(深圳)有限公司 Search result quality determination method and device, storage medium and computer equipment
CN113676460A (en) * 2021-07-28 2021-11-19 清华大学 Web application vulnerability integrated scanning method and system
CN117454881A (en) * 2023-12-19 2024-01-26 戎行技术有限公司 Website dynamic tag analysis method based on static page

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080077556A1 (en) * 2006-09-23 2008-03-27 Juan Carlos Muriente System and method for applying real-time optimization of internet websites for improved search engine positioning
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device
CN102262635A (en) * 2010-05-25 2011-11-30 北京启明星辰信息技术股份有限公司 Page crawler system and page crawler method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080077556A1 (en) * 2006-09-23 2008-03-27 Juan Carlos Muriente System and method for applying real-time optimization of internet websites for improved search engine positioning
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device
CN102262635A (en) * 2010-05-25 2011-11-30 北京启明星辰信息技术股份有限公司 Page crawler system and page crawler method

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095260A (en) * 2014-05-08 2015-11-25 广州爱九游信息技术有限公司 Webpage processing method and device aiming at search engine optimization
CN105095260B (en) * 2014-05-08 2017-03-29 广州爱九游信息技术有限公司 For the web page processing method and device of search engine optimization
CN104978523A (en) * 2014-11-06 2015-10-14 哈尔滨安天科技股份有限公司 Malicious sample capture method and system based on network hot word recognition
CN105391729A (en) * 2015-11-30 2016-03-09 中国航天科工集团第二研究院七〇六所 Web loophole automatic mining method based on fuzzy test
CN105631340B (en) * 2015-12-17 2019-01-18 珠海豹趣科技有限公司 A kind of method and device of XSS Hole Detection
CN105631340A (en) * 2015-12-17 2016-06-01 珠海市君天电子科技有限公司 XSS vulnerability detection method and device
CN105430002A (en) * 2015-12-18 2016-03-23 北京奇虎科技有限公司 Vulnerability detection method and device
CN105678170A (en) * 2016-01-05 2016-06-15 广东工业大学 Method for dynamically detecting cross site scripting (XSS) bugs
CN105678170B (en) * 2016-01-05 2018-05-29 广东工业大学 A kind of method of dynamic detection XSS loopholes
CN107292178A (en) * 2017-05-12 2017-10-24 北京计算机技术及应用研究所 A kind of security breaches based on multi-level factor of influence threaten quantization method
CN107292178B (en) * 2017-05-12 2020-12-01 北京计算机技术及应用研究所 Security vulnerability threat quantification method based on multi-level influence factors
CN107623695A (en) * 2017-09-30 2018-01-23 亚数信息科技(上海)有限公司 HTTPS web page resources safety evaluation method and equipment
WO2020000748A1 (en) * 2018-06-30 2020-01-02 平安科技(深圳)有限公司 File detection method and apparatus
CN112784141B (en) * 2019-10-23 2023-10-31 腾讯科技(深圳)有限公司 Search result quality determination method, apparatus, storage medium and computer device
CN112784141A (en) * 2019-10-23 2021-05-11 腾讯科技(深圳)有限公司 Search result quality determination method and device, storage medium and computer equipment
CN111478899A (en) * 2020-04-03 2020-07-31 大汉软件股份有限公司 Website trojan and lottery page identification method and system based on watermarks
CN112039877A (en) * 2020-08-28 2020-12-04 四川长虹电器股份有限公司 KLD-based storage type XSS injection detection method
CN112039877B (en) * 2020-08-28 2022-04-01 四川长虹电器股份有限公司 KLD-based storage type XSS injection detection method
CN113676460B (en) * 2021-07-28 2022-07-22 清华大学 Web application vulnerability integrated scanning method, system, electronic equipment and storage medium
CN113676460A (en) * 2021-07-28 2021-11-19 清华大学 Web application vulnerability integrated scanning method and system
CN117454881A (en) * 2023-12-19 2024-01-26 戎行技术有限公司 Website dynamic tag analysis method based on static page
CN117454881B (en) * 2023-12-19 2024-03-08 戎行技术有限公司 Website dynamic tag analysis method based on static page

Similar Documents

Publication Publication Date Title
CN103685189A (en) Website security evaluation method and system
CN101964025B (en) XSS detection method and equipment
KR101060639B1 (en) Javascript obfuscation strength of suspected infection site through the detection system and the detection method
CN109165507B (en) Cross-site scripting attack vulnerability detection method and device and terminal equipment
CN103279710B (en) Method and system for detecting malicious codes of Internet information system
CN102739675B (en) Website security detection method and device
Djuric A black-box testing tool for detecting SQL injection vulnerabilities
Guo et al. XSS vulnerability detection using optimized attack vector repertory
CN103645978A (en) Method, device and system for testing browser webpage loading time
CN104184728A (en) Safety detection method and device for Web application system
CN105141647A (en) Method and system for detecting Web application
US8572747B2 (en) Policy-driven detection and verification of methods such as sanitizers and validators
Rocha et al. Etssdetector: A tool to automatically detect cross-site scripting vulnerabilities
CN103839002A (en) Website source code malicious link injection monitoring method and device
CN106909846B (en) Vulnerability detection method and device based on virtual analysis
CN104303189A (en) Determining application vulnerabilities
CN110460612A (en) Safety detecting method, equipment, storage medium and device
Ocariza Jr et al. Automatic fault localization for client‐side JavaScript
CN103001946A (en) Website security detection method, website security detection equipment and website security detection system
CN113158197B (en) SQL injection vulnerability detection method and system based on active IAST
CN102571870A (en) Scoring method for web vulnerability scanning
CN103902912A (en) Method and device for detecting web page vulnerability
CN103324890A (en) Method and device for detecting vulnerable local files of links
CN106603572B (en) Vulnerability detection method and device based on probe
CN111064735A (en) SQL injection vulnerability detection method and system for power information system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326