ImageVerifierCode 换一换
格式:PDF , 页数:32 ,大小:623.65KB ,
资源ID:804569      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804569.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1211-2014 Techniques for preventing web-based attacks (Study Group 17)《防止网络攻击的技术(研究组17)》.pdf)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1211-2014 Techniques for preventing web-based attacks (Study Group 17)《防止网络攻击的技术(研究组17)》.pdf

1、 International Telecommunication Union ITU-T X.1211TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cyberspace security Cybersecurity Techniques for preventing web-based attacks Recommendation ITU-T X.1211 ITU-T X-SERIES RECOM

2、MENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X

3、799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast sec

4、urity X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229Countering spam

5、X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 CYBERSECURITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heur

6、istics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.16

7、39 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680X.1699 For further details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1211 (09/2014) i Recommendation ITU-T X.1211 Te

8、chniques for preventing web-based attacks Summary Recommendation ITU-T X.1211 describes techniques that can mitigate web-based attacks which occur when the vulnerabilities of the website hosts are exploited and malicious code is introduced that can infect a users computer. Several appendices illustr

9、ate how the attacks can occur as well as remediation steps. History Edition Recommendation Approval Study Group Unique ID*1.0 ITU-T X.1211 2014-09-26 17 11.1002/1000/12154 Keywords Prevention, SQL injection, spyware, suspicious content, vulnerability, web-based attack. _ *To access the Recommendatio

10、n, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T X.1211 (09/2014) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialize

11、d agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a

12、 view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recomme

13、ndations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conc

14、iseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommend

15、ation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party.

16、 INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Righ

17、ts, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementer

18、s are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2014 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written perm

19、ission of ITU. Rec. ITU-T X.1211 (09/2014) iii Table of Contents Page 1 Scope 1 2 References. 1 3 Terms and definitions . 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 2 5 Conventions 3 6 General overview 3 7 Web-based attack protection sys

20、tem techniques 4 7.1 General techniques . 4 7.2 Functional techniques . 4 7.3 Management techniques . 5 7.4 Security and privacy techniques . 5 8 Functions of the web-based attack protection system 5 9 Information exchange format . 6 Appendix I Scenarios for web-based attacks 7 I.1 Scenario for malw

21、are infection 7 I.2 Cross-site request forgery (CAPEC-62) . 7 I.3 Cross-site port attacks/server-side request forgery . 8 I.4 SQL injection 8 I.5 Detecting malware in websites . 9 Appendix II Method for infecting user computers with malware . 10 Appendix III Typical examples of obfuscation technique

22、 11 Appendix IV Prevention techniques for web-based attacks . 12 IV.1 Remove website vulnerabilities 12 IV.2 Signature matching . 12 IV.3 Site blacklisting 12 IV.4 Detection of obfuscating techniques 12 IV.5 Evaluation of suspicious content behaviour . 12 Appendix V Typical examples of application s

23、ecurity risks by OWASP 13 Bibliography. 22 Rec. ITU-T X.1211 (09/2014) 1 Recommendation ITU-T X.1211 Techniques for preventing web-based attacks 1 Scope This Recommendation provides techniques for preventing web-based attacks. It describes the use scenarios to distributing malwares through the web a

24、s well as the functional techniques and functions to prevent web-based attacks. 2 References None. 3 Terms and definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 asset b-ISO/IEC 27000: Anything that has value to the organization. NOTE There

25、are many types of assets, including: a) information; b) software, such as a computer program; c) physical, such as computer; d) services; e) people, and their qualifications, skills, and experience; and f) intangibles, such as reputation and image. 3.1.2 attack instance b-ITU-T X.1544: A specific de

26、tailed attack against an application or system targeting vulnerabilities or weaknesses in that system. 3.1.3 attack pattern b-ITU-T X.1544: An abstraction of common approaches of attack observed in the wild against applications or systems (e.g., SQL injection, man-in-the-middle, session hijacking).

27、NOTE A single attack pattern may potentially have many varying attack instances associable with it. 3.1.4 hypertext markup language (HTML) b-ITU-T M.3030: A system of coding information from a wide range of domains (e.g., text, graphics, database query results) for display by World Wide Web browsers

28、 Certain special codes, called tags, are embedded in the document so that the browser can be told how to render the information. 3.1.5 malware b-ISO/IEC 27033-1: Malicious software designed specifically to damage or disrupt a system, attacking confidentiality, integrity and/or availability. 3.1.6 o

29、bfuscation technique b-NIST SP 800-83: A way of constructing a virus to make it more difficult to detect. 3.1.7 personally identifiable information (PII) b-ITU-T X.1252: Any information a) that identifies or can be used to identify, contact, or locate the person to whom such information pertains; b)

30、 from which identification or contact information of an individual person can be derived; or c) that is or can be linked to a natural person directly or indirectly. 3.1.8 threat b-ITU-T X.800: A potential violation of security. 3.1.9 security domain b-ITU-T T.411: The set of resources subject to a s

31、ingle security policy. 2 Rec. ITU-T X.1211 (09/2014) 3.1.10 security domain authority b-ITU-T X.810: A security authority that is responsible for the implementation of a security policy for a security domain. 3.1.11 security policy b-ITU-T T.411: The set of rules that specify the procedures and serv

32、ices required to maintain the intended level of security of a set of resources. 3.1.12 signature b-NIST SP 800-83: A set of characteristics of known malware instances that can be used to identify known malware and some new variants of known malware. 3.1.13 spyware b-NIST SP 800-83: Malware intended

33、to violate a users privacy. 3.1.14 web browser plug-in b-NIST SP 800-83: A mechanism for displaying or executing certain types of content through a Web browser. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 anomaly: A pattern in the data that does no

34、t conform to the expected behaviour. 3.2.2 drive-by-download attacks: A pattern of a web-based attack caused when a user visits a website that exploits browser vulnerabilities and launches the automatic download and installation of malware without the knowledge or permission of the user. 3.2.3 web-b

35、ased attack: A pattern of attacks in which the attackers compromise the legitimate websites resulting in a malicious code to be injected into an application, which in turn can be used to infect the users computer visiting those websites or use vulnerabilities of web sites to launch attacks for users

36、 computer systems that visit that web sites, which occurs without involvement of malware. 3.2.4 web-based attack protection system: A set of systems which detects vulnerabilities, malwares or malicious codes embedded in the legitimate website and informs the web administrator of the detection result

37、 leading ultimately to their removal. NOTE Detection activities may be planned by schedule or may be triggered by network events or requests from other systems. 3.2.5 zombie computer: A computer that has been compromised and controlled by an attacker who has installed malwares such as computer viru

38、ses, Trojan horse, or bot net, which can be used to perform malicious attacks such as spreading e-mail spams and launching denial-of-service attacks. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: CAPEC Common Attack Pattern Enumeration and Classifica

39、tion CSRF Cross-Site Request Forgery CWE Common Weakness Enumeration DDoS Distributed Denial of Service DOM Document Object Model HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol ID Identity IODEF Incident Object Description Exchange Format LDAP Lightweight Directory Access Protocol R

40、ec. ITU-T X.1211 (09/2014) 3 MITM Man-in-the-Middle OS Operating System OWASP Open Web Applications Security Project PC Personal Computer PII Personally Identifiable Information PUI Program Under Inspection SNS Social Network Service SQL Structured Query Language SSRF Server-Side Request Forgery S/W

41、 Software URI Uniform Resource Identifier URL Uniform Resource Locator XSPA Cross-Site Port Attack XSS Cross-Site Scripting 5 Conventions None. 6 General overview Malware that is used to comprome information assets is defined as software designed specifically to damage or to disrupt a system, attack

42、ing confidentiality, integrity and/or availability. It includes computer viruses, worms, Trojan horses, spyware, adware, most rootkits and other malicious programs. A web-based attack is an attack whereby the attackers try to compromise the legitimate websites by exploiting existing vulnerabilities.

43、 This results in malicious code to be injected into the websites, which can in turn be used to infect the computers of users visiting those websites. The malicious code may have multiple forms: it can be a hidden iframe tag directing the user to visit an attack site, or it can be malicious applicati

44、ons written in a computer program language (e.g., script or applets). Typical examples of vulnerabilities of web-based attacks are Structured Query Language (SQL) injection, and cross-site request forgery (CSRF). A cross-site request forgery attack pattern b-CAPEC-62 is a type of web-based attack wh

45、ereby unauthorized commands are transmitted or unwanted actions are requested to be executed on a trusted website without the users knowledge while the user is logged into a trusted website. A Structured Query Language (SQL) injection attack pattern b-CAPEC-66 is another type of web-based attack on

46、a database-driven website in which the attacker adds an SQL code to a web from an input box to gain access to resources or make changes to data. It is used to steal information from a database from which the data would normally not be available and/or to gain access to an organizations host computer

47、s through the computer that is hosting the database. An in-line frame, also known as iframe tag b-iframe, is used to embed an invisible document within the current hypertext markup language (HTML) document and tricking the user to click on the invisible document through clickjacking b-CAPEC-103. Rec

48、ently, web-based attacks have been increasing significantly due to increasing use of end-user computing devices and the increasing number of websites that contain malware. 4 Rec. ITU-T X.1211 (09/2014) Anti-virus techniques could be implemented at the server side and web application firewalls could

49、be implemented at proxies for cost-effective implementation of these techniques. In web-based attacks, the administrators of the websites may not be aware that the websites have been hacked and injected with malicious code, and that these are used to disseminate malicious code. Moreover, users are not aware either that their computers may get infected by malicious code from the sites they have visited. Installing anti-virus software (S/W) can prevent some

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1