10 WEB攻击与防护技术 徐震 杨亮 《PHP语⾔程序设计》网络安全: 访问控制(对进出网络的信息进行过滤,并使对 HTTP等协议进行命令级控制) 入侵防范(木马、DDoS、缓冲区溢出) 安全审计 恶意代码防范 数据安全: 数据完整性(应能检测到重要业务数据的完整性 破坏,并采取必要的恢复措施) 第二级 网络安全: 入侵防范(木马、DDoS、缓冲区溢出) 安全审计 1.5.攻击案例 n 略 提纲 一、背景概述 二、典型攻击 三、攻防原理 防护方法 n 修补web服务器漏洞 n 用户输入过滤 51 3.6.分布式拒绝服务攻击 52 概述 n Distributed Denial of Service (DDoS) q 利用网络协议存在的固有漏洞,伪造合理的服务请求,消耗 有限的网络带宽或占用过多的服务资源,使网络或者服务无 法响应用户的正常请求,造成网络服务瘫痪。 q 资源耗尽型有:UDP DNS 集合的攻击程序包或者脚本:Ttools、rape q DDoS 攻击工具:TFN/TFN 2K .. q 工具变种:红色代码、SQL Slammer DDoS攻击DEMO 风险 n 系统服务中断 n 网络服务中断 n 互联网关键基础设施故障(如DNS等),进而 造成大范围网络中断 防护方法 n 增加资源投入 n 系统优化 n 网络优化 n 抗DDoS设备 64 3.7.认证和会话管理失效0 码力 | 114 页 | 3.65 MB | 1 年前3
WAF - 是时候跟正则表达式说再见感性认识—误报和漏报难以平衡 尝试寻找有理证明 WAF自身安全 正则表达式 计算复杂度 正则表达式DDOS攻击 非Regex DOS WAF防御能力 正则表达式DDOS攻击 提出一种正则表达式的DDOS攻击: 正则表达式的最坏时间复杂度大于等 于?(?2 ),该正则表达式可被DDOS 攻击 输入长度 (K) PCRE/PHP(ms) JAVA(ms) 1 0.5 142 8 458 500 10 720 786 20 2910 2941 Regex DDOS与Regex DOS不同 • ?(?2 ),?(2?) • Regex DDOS目前普遍存在 • Regex DOS很难找到了 寻找能被DDOS的正则表达式 寻找最坏时间复杂度大于等于? ?? 的正则表达式 利用正则表达式匹配的回溯 正则表达式匹配原理:NFA 匹配算法需要尝试每一条路径,直到找到一条匹配路径。尝试所有路径失败则匹配失败。 • 尝试所有匹配路径 • 路径尝试失败,需要回溯 正则表达式DDOS原理 正则:A.*B 文 本:AAN 正则:A.*B 文本:AAN 可被DDOS的一种正则表达式模式 ??????? = (????)(????)∗(SubC),其中???? ∈ ???? 例如0 码力 | 24 页 | 1.66 MB | 1 年前3
Using Istio to Build the Next 5G PlatformAspen Mesh. All rights reserved. EP EP DDOS DPI Firewall Firewall Crypto Middleboxes in Network Demarc Network Architecture DDOS DPI Firewall DDOS DPI Firewall 17 ©2021 Aspen Mesh. All0 码力 | 18 页 | 3.79 MB | 1 年前3
Is Your Virtual Machine Really Ready-to-go with Istio?smart DNS proxying (yet…) ● Further security middle boxes support ○ Deep packet inspection (DPI) ○ DDoS defense ○ Firewall ● Lack dedicated gateway support (architectural changes) ○ No separating out Ultimate goal ○ Proxyless services (for high performance) ● Offload ○ Traffic management ○ Security (DDoS defense…) ● HW acceleration ○ Crypto ○ Rule matching ● Further isolation w/ host ● CapEx, OpEx0 码力 | 50 页 | 2.19 MB | 1 年前3
Cilium v1.5 Documentationis ideal for running filtering programs that drop malicious or unexpected traffic, and other common DDOS protec�on mechanisms. Traffic Control Ingress/Egress: BPF programs a�ached to the traffic control level without was�ng any further resources. This is in par�cular useful for BPF programs implemen�ng DDoS mi�ga�on mechanisms or firewalling in general. The XDP_PASS return code means that the packet is programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. DDoS mi�ga�on, firewalling One of the basic XDP BPF features is to tell the driver to drop a packet with0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.6 Documentationis ideal for running filtering programs that drop malicious or unexpected traffic, and other common DDOS protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control without wasting any further resources. This is in particular useful for BPF programs implementing DDoS mitigation mechanisms or firewalling in general. The XDP_PASS return code means that the packet is programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. DDoS mitigation, firewalling One of the basic XDP BPF features is to tell the driver to drop a packet0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationis ideal for running filtering programs that drop malicious or unexpected traffic, and other common DDOS protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control without wasting any further resources. This is in particular useful for BPF programs implementing DDoS mitigation mechanisms or firewalling in general. The XDP_PASS return code means that the packet is programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. DDoS mitigation, firewalling One of the basic XDP BPF features is to tell the driver to drop a packet0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.8 Documentationis ideal for running filtering programs that drop malicious or unexpected traffic, and other common DDOS protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control without wasting any further resources. This is in particular useful for BPF programs implementing DDoS mitigation mechanisms or firewalling in general. The XDP_PASS return code means that the packet is programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. DDoS mitigation, firewalling One of the basic XDP BPF features is to tell the driver to drop a packet0 码力 | 1124 页 | 21.33 MB | 1 年前3
云原生安全威胁分析与能力建设白皮书(来源:中国联通研究院)容器网络内部,由于网络流量不通过物理网卡而在宿主机内部的容器通信, 存在容器虚拟网络间的 DoS 攻击风险。容器网络外部,由于宿主机上的所有容 器共享物理网卡资源,若外部攻击者向某一个目标容器发送大量数据包进行 DDoS 攻击,将可能占满宿主机的网络带宽资源,造成宿主机和其他容器的拒绝 服务。 2.4 路径 3:编排工具攻击 编排工具的工作依赖于容器及容器镜像技术,所以用户在使用编排工具时, 同样会面临容 Protection Platform 云工作负载保护平台 云原生安全威胁分析与能力建设白皮书 65 DAST Dynamic Application Security Testing 动态应用安全测试 DDoS Distributed Denial of Service 分布式拒绝服务 DevOps Development Operation 开发、运营 DevSecO ps Development0 码力 | 72 页 | 2.44 MB | 1 年前3
Cilium v1.10 Documentationis ideal for running filtering programs that drop malicious or unexpected traffic, and other common DDOS protection mechanisms. Traffic Control Ingress/Egress: BPF programs attached to the traffic control without wasting any further resources. This is in particular useful for BPF programs implementing DDoS mitigation mechanisms or firewalling in general. The XDP_PASS return code means that the packet is programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. DDoS mitigation, firewalling One of the basic XDP BPF features is to tell the driver to drop a packet0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 94 条
- 1
- 2
- 3
- 4
- 5
- 6
- 10













