发明名称 Dynamically scanning a web application through use of web traffic information
摘要 Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
申请公布号 US9208309(B2) 申请公布日期 2015.12.08
申请号 US201213563279 申请日期 2012.07.31
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION 发明人 Amit Yair;Bachar Ronen;Guy Lotem;Kreichman Igal;Nordan Ron;Saltzman Roi;Segal Ori
分类号 G06F21/00;G06F15/16;G06F21/55;H04L29/06 主分类号 G06F21/00
代理机构 Cuenot, Forsythe & Kim, LLC 代理人 Cuenot, Forsythe & Kim, LLC
主权项 1. A method of dynamically scanning a web application to perform a security analysis of the web application, the method comprising: collecting log file data from at least one log file, collecting the log file data comprising matching information from a previous HTTP request, which lead to a subsequent HTTP request being generated, using stateful parsing to identify information about at least one HTML parameter type by marking a certain parameter of the previous HTTP request as a parameter originating from a form or a hyperlink; entering data from the collected log file data into at least one data file; scanning the at least one data file to identify information relevant to security testing; from the identified information relevant to the security testing, generating, using a processor, at least a first HTTP request to exercise a web application to perform the security analysis of the web application, the first HTTP request corresponding to a second HTTP request generated by prior use or development of the web application and contained in the log file, the first HTTP request including form data that is different than form data contained in the second HTTP request and configured to specifically test for security vulnerabilities in the web application; communicating the HTTP request to the web application; receiving at least one HTTP response to the first HTTP request; analyzing, using the processor, the HTTP response to perform validation of the web application; and outputting results of the validation.
地址 Armonk NY US
您可能感兴趣的专利