【24h】

A Learning-Based Approach to the Detection of SQL Attacks

机译:一种基于学习的SQL攻击检测方法

获取原文
获取原文并翻译 | 示例

摘要

Web-based systems are often a composition of infrastructure components, such as web servers and databases, and of application-specific code, such as HTML-embedded scripts and server-side applications. While the infrastructure components are usually developed by experienced programmers with solid security skills, the application-specific code is often developed under strict time constraints by programmers with little security training. As a result, vulnerable web-applications are deployed and made available to the Internet at large, creating easily-exploitable entry points for the compromise of entire networks. Web-based applications often rely on back-end database servers to manage application-specific persistent state. The data is usually extracted by performing queries that are assembled using input provided by the users of the applications. If user input is not sanitized correctly, it is possible to mount a variety of attacks that leverage web-based applications to compromise the security of back-end databases. Unfortunately, it is not always possible to identify these attacks using signature-based intrusion detection systems, because of the ad hoc nature of many web-based applications. Signatures are rarely written for this class of applications due to the substantial investment of time and expertise this would require. We have developed an anomaly-based system that learns the profiles of the normal database access performed by web-based applications using a number of different models. These models allow for the detection of unknown attacks with reduced false positives and limited overhead. In addition, our solution represents an improvement with respect to previous approaches because it reduces the possibility of executing SQL-based mimicry attacks.
机译:基于Web的系统通常是基础结构组件(例如Web服务器和数据库)和特定于应用程序的代码(例如HTML嵌入脚本和服务器端应用程序)的组合。虽然基础结构组件通常是由具有扎实的安全技能的经验丰富的程序员开发的,但是特定于应用程序的代码通常是由程序员在严格的时间限制下进行的,几乎没有进行过安全培训。结果,易受攻击的Web应用程序被部署并提供给整个Internet,从而为整个网络的破坏创建了易于利用的入口点。基于Web的应用程序通常依赖于后端数据库服务器来管理特定于应用程序的持久状态。通常通过执行查询来提取数据,这些查询是使用应用程序用户提供的输入来组合的。如果未正确清理用户输入,则可能会发动各种攻击,这些攻击利用基于Web的应用程序来危害后端数据库的安全性。不幸的是,由于许多基于Web的应用程序的特殊性质,并非总是能够使用基于签名的入侵检测系统来识别这些攻击。由于需要大量时间和专业知识,因此很少为此类应用程序编写签名。我们已经开发了一个基于异常的系统,该系统使用许多不同的模型来学习基于Web的应用程序执行的常规数据库访问的配置文件。这些模型允许以减少的误报和有限的开销检测未知攻击。此外,我们的解决方案相对于以前的方法而言是一种改进,因为它减少了执行基于SQL的模仿攻击的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号