【24h】

A second-order SQL injection detection method

机译:二阶SQL注入检测方法

获取原文
获取原文并翻译 | 示例

摘要

Second-order SQL injection is a serious threat to Web application and it is more difficult to detect than first-order SQL injection. The attack payload of second-order SQL injection is from untrusted user input and stored in database or file system, the SQL statement submitted by web application is usually dynamically assembled by a trusted constant string in the program and untrusted user input, and the DBMS in unable to distinguish the trusted and untrusted part of a SQL statement. The paper presents a method of detecting second-order SQL injection attacks based on ISR (Instruction Set Randomization). The method randomizes the trusted SQL keywords contained in Web applications to dynamically build new SQL instruction sets, and add a proxy server before DBMS, the proxy detects whether the received SQL instruction contains standard SQL keywords to find attack behavior. Experimental results show that this system can effectively detect second-order SQL injection attack and has low processing cost.
机译:二阶SQL注入是对Web应用程序的严重威胁,比一阶SQL注入更难检测。二阶SQL注入的攻击有效载荷来自不受信任的用户输入,并存储在数据库或文件系统中,Web应用程序提交的SQL语句通常由程序中的受信任常量字符串和不受信任的用户输入动态组装,而DBMS无法区分SQL语句的受信任和不受信任的部分。本文提出了一种基于ISR(指令集随机化)的二阶SQL注入攻击检测方法。该方法随机化Web应用程序中包含的受信任SQL关键字以动态构建新的SQL指令集,并在DBMS之前添加代理服务器,该代理检测接收到的SQL指令是否包含标准SQL关键字以查找攻击行为。实验结果表明,该系统可以有效地检测二阶SQL注入攻击,处理成本低。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号