DOI QR코드

DOI QR Code

Vulnerability Analysis of the Creativity and Personality Education based on Digital Convergence Curation System

창의·인성 교육기반의 디지털 융합 큐레이션 시스템에 관한 취약점 분석

  • Received : 2015.06.03
  • Accepted : 2015.08.20
  • Published : 2015.08.31

Abstract

With the growing number of people that use web services, the perception of the importance of securing web applications is also increasing. There are many different types of attacks that target web applications. In the rapidly-changing knowledge and information society, which came into being with the advancements made in information and communication technology, there is currently an urgent need for building web sites for the purposes of developing one's creativity and character. In this paper, attack schemes that use SQL injections and XSS and target educational digital curation systems which provide educational contents with the aim of developing of one's creativity and character are analyze, in terms of how the attacks are carried out and their vulnerabilities. Furthermore, it suggests ways of dealing appropriately with these web-based attacks that use SQL injections and XSS.

웹 서비스 사용자가 증가하면서 웹 애플리케이션을 공격하는 방법들이 여러 가지 유형들로 나타나면서 웹 애플리케이션 보안에 관한 중요성의 인식도 증가하고 있다. 정보통신기술 발달과 함께 도래한 지식정보사회는 급변하는 사회에서 창의성과 인성 교육에 필요한 웹사이트의 구축이 절실히 요구되고 있다. 본 논문에서는 창의 인성 교육기반의 디지털 큐레이션 시스템에서 제공하는 교육 콘텐츠에 대한 SQL Injection과 XSS에 대한 공격 방법과 취약점을 분석한다. 그리고 SQL Injection과 XSS에 대한 웹 공격에 대응하는 방법을 제시하고자 한다.

Keywords

References

  1. Steven Rosenbaum, Curation: A Breakthrough from the Age of Info-Glut, Myungjin Publishing Co., Seoul, 2011.
  2. Jung-Sook Kim, "Video Curating Service System Using Mashup Customization Technique", Journal of Korea Multimedia Society, Vol. 17, No. 4, 2014.
  3. http://www.wizmeta.com/
  4. Fischman W, Solomon B, Greenspan D, Gardner H, Making good: how young people cope with moral dilemmas at work. Cambridge: Harvard University Press. 2004.
  5. Open Web Application Security Project(OWASP), "OWASP Top 10 for 2013", 12 June, 2013.
  6. The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org/
  7. In-yong Lee, Jae-ik Cho, Kyu-hyung Cho, Jong0sub Moon, "SA Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values", KIISC, 18(5), pp. 135-147, 2008.
  8. Thomas. S, Williams. L, "Using Automated Fix Generation ot Secure SQL Statements", In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007.
  9. Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, "Sania : Syntactic and Semantic Analysis for Automated Testing against SQL Injection", In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007.
  10. Jae-Chul Park, Bong-Nam Noh, "QL Injection Attack Detection : Profiling of Web Application Parameter Using the Sequence Pairwise Alignment", Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007.
  11. Bozic, J.; Wotawa, F., "XSS pattern for attack modeling in testing", Automation of Software Test (AST), 2013 8th International Workshop on, Vol., No., pp.71-74, May, 2013.
  12. Shahriar, H.; Zulkernine, M., "S2XS2: A Server Side Approach to Automatically Detect XSS Attacks," Dependable, Autonomic and Secure Computing(DASC), 2011 IEEE Ninth International Conference, Vol., No., pp.7-14, Dec. 2011.
  13. Hui Zhao; Wen Chen, "A Web Page Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion", Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on , Vol., No., pp.241-245, Oct. 2010.
  14. Yi Wang; Zhoujun Li; Tao Guo, "Program Slicing Stored XSS Bugs in Web Application," Theoretical Aspects of Software Engineering (TASE), 2011 Fifth International Symposium on, Vol., No., pp.191-194, Aug. 2011.
  15. Sung-hyuck Hong, "XSS Attack and Countermeasure: Survey", The Journal of Digital Policy & Management, Vol. 11, No. 12, pp. 327-332, 2013.

Cited by

  1. Program Develope and Class Design for Convergence ICT and Character Education vol.14, pp.9, 2016, https://doi.org/10.14400/JDC.2016.14.9.9
  2. A study on digital jewelry design through reinterpretation of symbolic element of Peony flower in Minwha with Linguistic analysis vol.14, pp.8, 2016, https://doi.org/10.14400/JDC.2016.14.8.407
  3. A Study on the Effect of Visual Communication Utilizing Smartphones on Basic Mathematics Education at the Tertiary Level vol.14, pp.10, 2016, https://doi.org/10.14400/JDC.2016.14.10.53
  4. The effect of E-commerce's curation characteristics on the customer purchase intention - Focusing on the mediating effect of satisfaction - vol.14, pp.5, 2016, https://doi.org/10.14400/JDC.2016.14.5.185