Research On Security Technology Based On WEB Application
Research On Security Technology Based On WEB Application
Fanxing Kong
1 Linyi University, Shandong China, 276000
Abstract: This article described the relevant technologies of web security, thoroughly analyzed the application
security of Web in three aspects of security threats of Web client, security threats of Web server, security
threats of data transmission, and accordingly studied the security technology based on WEB application.
Hope the elaboration of this article could provide some reference to the relevant personnel in the field.
1 INTRODUCTION
2.2 Authorization technology
With the advent of the information era, WEB application
has entered into people's life and work, and the After authentication, if the subject has the right of
application programs based on WEB have been fully follow-up access, the access rights involved, we can call
used in various fields, including Internet management, it authorization. Authorization mainly contains two
control of facilities, etc (Xiaojie X,2015). aspects, the first is the control information of resource
For the current Internet, any information and data access; the second is the information of subject.
needs the WEB service. Now, WEB has been widely
used, and the programs and data based on WEB 2.3 Security and privacy technology
application are the targets mostly attacked by network
hackers. According to the relevant reports, the Internet This technique is mainly hidden in the user information
data vulnerabilities are all the key ways of secure without authorization application, which mainly uses
dissemination. Browser and WEB applications began to encryption technology, after encryption, users can
be hacked, in which, 75% of the Internet threats are transfer data, but other users can not view the transmitted
related to WEB applications. These security risks have information, even by the network protocol analyzer
brought serious losses to the relevant areas. Then, the (Juan D,2014).
paper will further analyze and discuss the security
technologies based on WEB application
comprehensively (Ziqian W,2015). 3 SECURITY ANALYSIS OF WEB
APPLICATION
2 RELATED TECHNOLOGIES OF Web application mainly consists of two parts, the first is
WEB SECURITY the client; the second is the server. It mainly draws
support from the TCP/IP protocol layer to achieve data
2.1 Authentication technology transmission and processing. The most widely used
client program is the Web browser. The Web server has
The so-called authentication technology mainly refers access to Web resources. Web resources mainly involve
the process that divide it into two subjects, and one of the five aspects, the static text file, document of hypertext
subjects clear confirms the other. When one user's markup language, media file, client code and dynamic
identity is taken as a subject, it requires to use script. The mode of Web application is shown in figure 1
authentication technology to verify its identity, if (Yi S,2014):
successful, it can continue to access, otherwise, it cannot
(Dongjiao Z,2016).
367
Kong F.
Research on Security Technology based on WEB Application.
367
DOI: 10.5220/0006450603670370
In ISME 2016 - Information Science and Management Engineering IV (ISME 2016), pages 367-370
ISBN: 978-989-758-208-0
c 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
Copyright
ISME 2016 - Information Science and Management Engineering IV
ISME 2016 - International Conference on Information System and Management Engineering
368
368
Research on Security Technology based on WEB Application
Research on Security Technology based on WEB Application
4 SECURITY TECHNOLOGY OF third, the data call mechanism; fourth, the protection
WEB APPLICATION DATA mechanism of data processing.
369
369
ISME 2016 - Information Science and Management Engineering IV
ISME 2016 - International Conference on Information System and Management Engineering
TCP/UDP, but people often use it in UDP, for the Juan D, Yang X, Yuwei M., Research and design of audit
transmission of voice and video is mainly based on system of security log based on Web application.
UDP. Netinfo security, (10):70-76,2014
Protection of data authentication and integrity: in Yi S, Dongyun L, Wenjie W., Research on the key
technology of security testing platform of Web
general, the authentication algorithm used by RTP is application program. Information Security and
MAC-SHA1. After the calculation results are sent to the Technology, (1):29-32, 2014,
data packet, the receiving side will choose a reasonable Wang X.,Desing of Secure Identity Authentication System
label value of M according to the calculation results, and Based on JAAS in the Web Application System. Journal
compare it with the label value received (Hung-Bin of Beijing University of Civl Engineering and
C,2015). Architecture, 24(2):55-59,2008
Yubei Y., Application security of PGP encryption
4.3.3 RTMPS protocol technology based on WEB in mail system, Network
Security Technology & Application,(6):38-40,2015
RTMPS protocol is also called security protocol, it is the Chuan L., Research on Application of Web J2EE system
protocol got after the SSL encryption. The protocol can identity authentication security mechanism based on
Unix authentication. Journal of Chongqing University
support data transfer. The main function of secure of Arts and Sciences,(4):65-67,2010
sockets layer is to provide a security protocol with data Chengyu H. Research on the protection method of Web
integrity for network communication. SSL mainly uses Java application software, Software Guide,(11):57-
the transmission layer to achieve the encryption of the 58,2011
network link. The default port is 443. Yongxiang W, On WEB website security optimization.
Network Security Technology & Application,(5):136-
1137,2014
Linhai Y, Binying H., Research on the content of Web
5 CONCLUDING REMARKS code security artificial audit, Jiangxi Science,(4):536-
538,2014
All in all, with the rapid development of Internet Hung-Bin C, Izhak Rubin,Ofer Hadar., Scalable Video
technology, the application programs based on Web Multicast for Multi-Cell Cellular Wireless Networks.
have steadily developed, and become an important Journal of Communications, 10(9):715-727, 2015
standard of the current computing platform. With the
appearance of Web mail, shopping and media, Web
applications has entered our work, life and learning,
become an indispensable part of our daily life, and
played a key role in network information service.
Because of the rapid development of Web technology,
applications related to Web have become cumbersome,
which also makes the security vulnerabilities gradually
emerge. In order to ensure the safety of Internet
applications, it is necessary to conduct a comprehensive
security analysis of the Web application, and develop an
efficient and reliable method to prevent attacks, so as to
ensure the security of programs and data.
REFERENCE
Xiaojie X, Yang X, Shuo J., Research and Design of Web
Application Firewall Based on Feature Matching.
Netinfo security, (11)53-59,2015
Ziqian W, Bo W., Research on technology taking use of
vulnerability of information security in Web
application system. Electronic Product Reliability and
Environmental Testing, (6):30-33, 2015
Dongjiao Z, Ping W., Analysis on the security technology
of Java Web application program. Computer fan,
(3):48-49,2016
370
370