• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (3): 31-34.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • 上一篇    下一篇

主动Web漏洞扫描中的场景技术研究

余杰,李舟军,张翀斌,李强   

  1. ( 国防科学技术大学计算机学院,湖南 长沙 410073)
  • 收稿日期:2008-09-15 修回日期:2008-12-10 出版日期:2010-03-10 发布日期:2010-03-10
  • 通讯作者: 余杰 E-mail:yj@nudt.edu.cn
  • 作者简介:余杰(1982),男,重庆人,博士生,研究方向为网络安全与测量;李舟军,博士,教授,博士生导师,研究方向为高可信软件理论与技术、网络与信息安全、数据与文本挖掘技术。

Research on the Scenario of the Active Scanning of Web Vulnerability

 YU Jie, LI Zhou-Jun, ZHANG Chong-Bin, LI Jiang   

  1. (School of Computer Science,National University of Defense Technology,Changsha 410073)
  • Received:2008-09-15 Revised:2008-12-10 Online:2010-03-10 Published:2010-03-10
  • Contact: YU Jie E-mail:yj@nudt.edu.cn

摘要:

当前,主要的开源Web漏洞扫描工具如Nikto、Nessus等都存在误报率与漏报率较高、评估不准确、扫描效率较低等问题。本文对漏洞扫描过程进行建模,在传统的基于配置的扫描策略上,提出了一种基于场景的扫描策略。使用场景树描述漏洞场景,并给出了场景树的构建及维护策略。最后,以Nikto的漏洞数据库为例,示范了如何将多条漏洞用例转化为场景树描述。使用漏洞场景扫描策略可以提高扫描效率,减小误报率,提高评估的准确度。

关键词: 网络安全, 漏洞扫描, 基于场景的扫描策略, 场景树

Abstract:

Recently, Web vulnerability scanning has an important role in network security. However, the most popular open source web vulnerability scanners, such as Nikto, Nessus, etc., have been criticized for their high false alarms, inaccurate evaluation and low sanning efficiency. In this paper, the process of vulnerability scanning is modeled accurately and a new scenariobased scanning strategy is presented. Vulnerability scenario is described by a scenario tree. The algorithms of how to construct and maintain scenario trees in vulnerability databases are also proposed. Finally, we analyze the vulnerability database of Nikto and demonstrate how to construct a scenario tree using its vulnerability records. We prove and validate that the scenariobased scanning strategy can improve the efficiency and veracity of vulnerability sanning.

Key words: etwork security;vulnerability scanning;scenariobased scanning strategy;scenario tree

中图分类号: