首页> 外文会议>IEEE International Conference on Communication Software and Networks >An approach for SQL injection detection based on behavior and response analysis
【24h】

An approach for SQL injection detection based on behavior and response analysis

机译:基于行为和响应分析的SQL注入检测方法

获取原文

摘要

Nowadays the Internet is closely related to our daily life. We enjoy the quality of service the provided by The Internet at the same time, but also suffer from the threat of network security. Among the many threats, SQL injection attacks are ranked in the first place. SQL injection attack refers to “when the user sends a request to the server, the malicious SQL command will be inserted into the web form or request URL parameters, leading to the server to perform illegal SQL query. The existing SQL injection detection methods include static analysis, dynamic analysis, parameterized query, intrusion detection system, parameter filtering and so on. However, these methods have some defects. Static analysis method can only detect the type and grammatical errors of SQL. Dynamic analysis can only detect the vulnerability predefined by application developers. Parameter filtering is based on regular expressions and black list to filter invalid characters. This method needs predefined regular expressions, but due to the diversity of SQL syntax and user input, resulting in a regular expression can't meet the requirements of detection, and has the defects that the attackers bypass detection to inject by the way of encoding parameters. In this paper, we propose a new approach to detect and prevent SQL injection. Our approach is based on the attack behavior and the analysis of response and state of the web application under different attacks. Our method perfectly solves the problems existing in methods mentioned above, and has higher accuracy.
机译:如今,互联网与我们的日常生活息息相关。我们在享受互联网同时提供的服务质量的同时,还遭受网络安全的威胁。在众多威胁中,SQL注入攻击排名第一。 “ SQL注入攻击”是指“当用户向服务器发送请求时,恶意SQL命令将被插入到Web表单或请求URL参数中,从而导致服务器执行非法SQL查询。现有的SQL注入检测方法包括静态分析,动态分析,参数化查询,入侵检测系统,参数过滤等。但是,这些方法有一些缺陷。静态分析方法只能检测SQL的类型和语法错误。动态分析只能检测应用程序开发人员预定义的漏洞。参数过滤基于正则表达式和黑名单来过滤无效字符。该方法需要预定义的正则表达式,但由于SQL语法和用户输入的多样性,导致正则表达式无法满足检测要求,并且存在攻击者绕过检测以编码参数方式注入的缺陷。 。在本文中,我们提出了一种检测和防止SQL注入的新方法。我们的方法基于攻击行为以及对不同攻击下Web应用程序的响应和状态的分析。我们的方法完美地解决了上述方法中存在的问题,并且具有较高的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号