4 SECURITY TECHNOLOGY OF
WEB APPLICATION DATA
4.1 Security technology of client
For the security threats of browser and the host operating
system, in order to enhance the security of the host
operating system and browser, browser version and real
time patch update of operating system should be well
done in the link of security, and the vulnerabilities of
browser and operating system should be timely repaired.
For the security threat of Web client’s script, Web
client’s ability of fighting against attacks should be
strengthened, install detection system in the Web client
script, and detect regularly. In general, there are two
kinds of detection technologies for malicious web page,
the first is static detection; the second is dynamic
detection. Static detection detects malicious code on the
webpage by code analysis. Compared to static detection,
dynamic detection has relative low efficiency, but strong
pertinence, which can effectively identify the malicious
code in the page. If the malicious code is encrypted or
changed, dynamic detection can read the relevant
information in malicious code, analyze characteristics of
the behavior, and then achieve the purpose of protection.
Therefore, dynamic detection has good accuracy.
4.2 Security protection method of
server
4.2.1 AJAX protection mechanism
Comparing the AJAX protection mechanism and
original security system of Web application, there are
certain similarities in nature, which contains the data
query by interacting with data, response ability of data
transfer, capability of data transmission and information
call, etc.
4.2.2 Input validation
In order to prevent the phenomenon of only the user side
is verified, all of the information of clients and servers
should be verified, such as the verification of HTTP
header, cookie verification, parameter verification, data
validation, and the verification of length, specification of
user data.
4.2.3 Security of client’s program code
The protection mechanism mainly involves four aspects,
first, the application system mechanism of user end;
second, mechanism of third party’s external program;
third, the data call mechanism; fourth, the protection
mechanism of data processing.
4.2.4 SOAP filtering and WSDL
strengthening mechanism
Typically, before the filtering of firewall or HTTP layer,
it is unable to defend the attack of Web services, and
needs to play the effect of resistance in the filter and
supervision of SOAP layer. While as one of key sources,
information of WSDL date could not be leaked, its
enforcement mechanism mainly includes two aspects,
the first is in the process of program design, it needs to
provide the corresponding function; second, it is only
used in SSL.
4.2.5 Authentication, authorization and
development mechanism of security
program
The protection mechanism involves five aspects, first, R
&D staff of the system carry out WSDL access control;
second, apply security assertion markup language; third,
WS-Security certificate; fourth, SOAP filtration; fifth,
data transfer.
4.3 Security technology of data
transmission
4.3.1 HTTPS protocol
HTTPS mainly refers to running HTTP based on SSL,
the structure after fusion is called HTTPS, when building
a TCP in HTTP, link to it, when the user side presents a
demand server will give corresponding reply. In the
process of applying SSL, the user side must build a TCP,
link to it, build a SSL channel on it, send the same
requirement in the SSL channel, and the server side will
make corresponding response to the SSL channel. In
terms of the traditional HTTP server, the information
SSL accepts is equivalent to spam, because that not all of
the servers can apply SSL. Therefore, in order to ensure
the quality of the data, it needs to select the appropriate
application channels in the application process. It needs
to use the Web address starting with HTTPS to achieve
the application of SSL.
4.3.2 SRTP protocol
SRTP protocol mainly researches and develops the
safety performance of the two contents, the first is the
voice stream; the second is the video stream, SRTP gives
the encryption modes and cognitive methods
corresponding to AES. So the main function of SRTP
protocol is security and real time. SRTP can be used in
Research on Security Technology based on WEB Application
369