Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (3): 81-83    DOI:
Current Issue | Archive | Adv Search |
The Principle of CSRF and Protective Measures
Yang Jiaying
Guangdong Trade Vocational Technical School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  CSRF relies on HTTP stateless request, uses HTML to force the attracted browser to submit the request, so as to achieve the attack purpose. CSRF is hard to be found and has great harm. This paper deeply studies the principle of CSRF and the protective measures, strives to minimize the CSRF damage.
Key wordsCross-Site Request Forgery      catch      cheating      protection      attack     
Published: 10 November 2017
ZTFLH:  TP393.08  

Cite this article:

Yang Jiaying. The Principle of CSRF and Protective Measures. Computer & Telecommunication, 2016, 1(3): 81-83.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I3/81

[1] ZHANG Zhi-yuan. DDoS Attack Detection Method on Application Layer Based on Clustering[J]. 电脑与电信, 2021, 1(7): 25-28.
[2] LIN Long. Model-based Robust RecognitionAlgorithm for Deep Learning Communication Signals[J]. 电脑与电信, 2021, 1(1): 20-22.
[3] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[4] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[5] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[6] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[7] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[8] LANG Hai. Smart Fire Protection Based on NB-IoT[J]. 电脑与电信, 2019, 1(5): 71-74.
[9] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[10] CAOWei-jun. Analysis and Consideration of the Maintenance of Voice Core Network[J]. 电脑与电信, 2018, 1(3): 37-39.
[11] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[12] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[13] LIU Bei-xiong ZHANGJiang-li XIAO Qiao-ling ZENG De-sheng. Research on Big Data Technology of Environmental Protection and Training of Applied Talents in Higher Vocational Colleges[J]. 电脑与电信, 2018, 1(12): 39-42.
[14] Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal[J]. 电脑与电信, 2017, 1(5): 38-40.
[15] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd