Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.4.225

Vulnerability Analysis of the Creativity and Personality Education based on Digital Convergence Curation System  

Shin, Seung-Soo (Dept. of Information Security, Tongmyong University)
Kim, Jung-In (Dept. of Computer Engineering, Tongmyong University)
Youn, Jeong-Jin (Dept. of Early Childhood Education, Tongmyong University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.4, 2015 , pp. 225-234 More about this Journal
Abstract
With the growing number of people that use web services, the perception of the importance of securing web applications is also increasing. There are many different types of attacks that target web applications. In the rapidly-changing knowledge and information society, which came into being with the advancements made in information and communication technology, there is currently an urgent need for building web sites for the purposes of developing one's creativity and character. In this paper, attack schemes that use SQL injections and XSS and target educational digital curation systems which provide educational contents with the aim of developing of one's creativity and character are analyze, in terms of how the attacks are carried out and their vulnerabilities. Furthermore, it suggests ways of dealing appropriately with these web-based attacks that use SQL injections and XSS.
Keywords
SQL Injection; Cross-site Scripting(XSS); Digital Curation; Web security; Social Network Service; Creativity and Personality;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Steven Rosenbaum, Curation: A Breakthrough from the Age of Info-Glut, Myungjin Publishing Co., Seoul, 2011.
2 Jung-Sook Kim, "Video Curating Service System Using Mashup Customization Technique", Journal of Korea Multimedia Society, Vol. 17, No. 4, 2014.
3 http://www.wizmeta.com/
4 Fischman W, Solomon B, Greenspan D, Gardner H, Making good: how young people cope with moral dilemmas at work. Cambridge: Harvard University Press. 2004.
5 Open Web Application Security Project(OWASP), "OWASP Top 10 for 2013", 12 June, 2013.
6 The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org/
7 In-yong Lee, Jae-ik Cho, Kyu-hyung Cho, Jong0sub Moon, "SA Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values", KIISC, 18(5), pp. 135-147, 2008.
8 Thomas. S, Williams. L, "Using Automated Fix Generation ot Secure SQL Statements", In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007.
9 Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, "Sania : Syntactic and Semantic Analysis for Automated Testing against SQL Injection", In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007.
10 Jae-Chul Park, Bong-Nam Noh, "QL Injection Attack Detection : Profiling of Web Application Parameter Using the Sequence Pairwise Alignment", Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007.
11 Bozic, J.; Wotawa, F., "XSS pattern for attack modeling in testing", Automation of Software Test (AST), 2013 8th International Workshop on, Vol., No., pp.71-74, May, 2013.
12 Shahriar, H.; Zulkernine, M., "S2XS2: A Server Side Approach to Automatically Detect XSS Attacks," Dependable, Autonomic and Secure Computing(DASC), 2011 IEEE Ninth International Conference, Vol., No., pp.7-14, Dec. 2011.
13 Hui Zhao; Wen Chen, "A Web Page Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion", Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on , Vol., No., pp.241-245, Oct. 2010.
14 Yi Wang; Zhoujun Li; Tao Guo, "Program Slicing Stored XSS Bugs in Web Application," Theoretical Aspects of Software Engineering (TASE), 2011 Fifth International Symposium on, Vol., No., pp.191-194, Aug. 2011.
15 Sung-hyuck Hong, "XSS Attack and Countermeasure: Survey", The Journal of Digital Policy & Management, Vol. 11, No. 12, pp. 327-332, 2013.