Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.9.1011

Implementation and Design of Proxy System for Web vulnerability Analysis  

Kim, Gwang-Hyun (광주대학교 정보통신학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.9, 2014 , pp. 1011-1018 More about this Journal
Abstract
Because of the proliferation of web services through web site, web hacking attempts are increasing using vulnerabilities of the web application. In order to improve the security of web applications, we have to find vulnerabilities in web applications and then have to remove. This paper addresses a vulnerability in a web application on existing problems and analyze and propose solutions to the vulnerability. This paper have checked the stability of existing web security solutions and evaluated its suitability through analysis of vulnerability. Also, we have implemented the vulnerability analysis tools for web Proxy system and proposed methods to optimize for resolution of web vulnerabilities.
Keywords
Web Hacking; Vulnerability; Web Proxy; Web Application;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 D.-Y. Kim, "Vulnerability Analysis for Industrial Control System Cyber Security," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 1, 2014, pp. 137-142.   과학기술학회마을   DOI
2 D.-K. Kang, M.-Y. Hyun, and C.-S. Kim, "Cyber trap : Unknown Attack Detection System based on Virtual Honeynet," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, 2013, pp. 863-871.   DOI
3 I.-Y. Lee, J.-I. Cho, K.-H. Cho, and J.-S. Moon, "A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values," J. of the Korea Institute of information Security & Cryptology, vol. 18, no. 5, 2008, pp. 135-147.   과학기술학회마을
4 S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Commu nication Sciences, vol. 9, no. 2, 2014, pp. 261-266.   과학기술학회마을   DOI
5 C. Kaufman, M. Spiciner, and R. Perlman, Network Security Private Communication in a PUBLIC World, 2nd Edition, Englewood Cliffs, NJ : Prentice Hall, 2002.
6 M. O'Neill, P. Hallam-Baker, and S. M. Cann, Web Services Security. New York : McGraw-Hill, 2003.
7 S. Garfinke, Web Security, Privacy and Commerce, 2nd Edition, Sebastopol, CA : O'Reilly Media, 2002.