【24h】

A Taxonomy of SQL Injection Detection and Prevention Techniques

机译:SQL注入检测和预防技术分类

获取原文
获取原文并翻译 | 示例

摘要

While using internet for proposing online services is increasing every day, security threats in the web also increased dramatically. One of the most serious and dangerous web application vulnerabilities is SQL injection. SQL injection attack took place by inserting a portion of malicious SQL query through a non-validated input from the user into the legitimate query statement. Consequently database management system will execute these commands and it leads to SQL injection. A successful SQL injection attack interfere Confidentiality, Integrity and availability of information in the database. Based on the statistical researches this type of attack had a high impact on business. Finding the proper solution to stop or mitigate the SQL injection is necessary. To address this problem security researchers introduce different techniques to develop secure codes, prevent SQL injection attacks and detect them. In this paper we present a comprehensive review of different types of SQL injection detection and prevention techniques. We criticize strengths and weaknesses of each technique. Such a structural classification would further help other researchers to choose the right technique for the further studies.
机译:尽管使用Internet提出在线服务的提议每天都在增加,但是Web中的安全威胁也急剧增加。 SQL注入是最严重和危险的Web应用程序漏洞之一。通过将来自用户的未经验证的输入插入一部分恶意SQL查询到合法查询语句中,从而进行了SQL注入攻击。因此,数据库管理系统将执行这些命令,并导致SQL注入。成功的SQL注入攻击会干扰数据库中信息的机密性,完整性和可用性。根据统计研究,此类攻击对业务影响很大。必须找到适当的解决方案来停止或减轻SQL注入。为了解决此问题,安全研究人员引入了不同的技术来开发安全代码,防止SQL注入攻击并对其进行检测。在本文中,我们对不同类型的SQL注入检测和预防技术进行了全面回顾。我们批评每种技术的优缺点。这种结构分类将进一步帮助其他研究人员选择正确的技术进行进一步的研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号