Research of Existing Security Problems in E-Commerce Sites and Defense Technology

Article Preview

Abstract:

With the development of network, e-commerce has gradually become a new mode of human commercial activities. China's e-commerce is just beginning, and there are good prospects for development. However, with a growing number of users, the security issues become increasingly prominent. Now, to protect e-commerce sites and the users' information and property of these websites is a matter of great urgency. The paper analyzes security problems that exist in the e-commerce sites, and brings forward an improved BM-algorithm to solve these threats, which is named BMHSA algorithm. This algorithm can provide significant improvement in pattern matching performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2519-2523

Citation:

Online since:

August 2013

Authors:

Export:

Price:

[1] Wei Gaoqi, Research and solution of existing security problems in current internet website system[C], ASID 2008. 2nd International Conference, 20-23 Aug. 2008, pp.132-135.

DOI: 10.1109/iwasid.2008.4688378

Google Scholar

[2] Wang Pengcheng, Zhang Tianzuo, Computer network intrusion detection system matching algorithm[J], Computer CD Software and Applications, vol. 12, 2010, pp.29-30.

Google Scholar

[3] R. Heady, G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system[R]. Technical report, Computer Science Department, University of New Mexico, August (1990).

DOI: 10.2172/425295

Google Scholar

[4] BOYER R.S., MOORE J.S., 1977, A fast string searching algorithm [J]. Communications of the ACM. 20, pp.762-772.

DOI: 10.1145/359842.359859

Google Scholar

[5] R. A. Baeza-Yates, G. H. Gonnet, and M. Regnier, Analysis of Boyer-Moore type string searching algorithms[C], Proc. 1st ACM-SIAM Symposium on Discrete Algorithms, San Francisco 1990, pp.328-343.

Google Scholar

[6] R. A. Baeza-Yates and M. Regnier, Average running time of the Boyer-Moore-Horspool algorithm [J], Theoretical Computer Science 92 (1992), pp.19-31.

DOI: 10.1016/0304-3975(92)90133-z

Google Scholar

[7] E. Guillen, D. Padilla and Y. Colorado, Weakness and Strength Analysis over Network-Based Intrusion Detection and Prevention System[C], IEEE Latin-American Conference on Communications, (2009).

DOI: 10.1109/latincom.2009.5305047

Google Scholar