首页> 外文会议>Annual midwest instruction and computing symposium >Comparing NoSQL and SQL Database Systems Based on Vulnerability to Injection and Adequacy of Countermeasures
【24h】

Comparing NoSQL and SQL Database Systems Based on Vulnerability to Injection and Adequacy of Countermeasures

机译:基于漏洞的NoSQL和SQL数据库系统基于注射的脆弱性和对策的充分性

获取原文

摘要

Databases are an integral part of the internet since storage of data is important for applications or websites. Hence, it is of the highest priority that these databases are kept as secure as possible. SQL Injections (SQLi) [11] involve the permeation of SQL databases, such as MySQL, with the use of strings containing SQL keywords being injected into queries, usually through an online form. NoSQL Injections (NoSQLi) are similar, but they are used to permeate NoSQL databases such as MongoDB To fully understand the threat that SQLi and NoSQLi pose to their respective databases, two identical websites were created, one using a MySQL database and the other using a MongoDB. Attacks were made using an online login form to these websites. Different injection techniques were used on both websites and relative ease at which the attack took place were documented. Without proper measures, i.e. the sanitization of strings, both were equally susceptible and that simple countermeasures could be used to prevent a wide array of attacks.
机译:数据库是Internet的一个组成部分,因为数据存储对于应用程序或网站很重要。因此,这是最优先的优先级,这些数据库尽可能安全。 SQL注入(SQLI)[11]涉及SQL数据库(例如MySQL)的渗透,使用包含将SQL关键字注入查询的字符串,通常通过在线表单。 NoSQL注入(NoSQLI)是相似的,但它们用于渗透NoSQL数据库,例如MongoDB,以充分了解SQLI和NoSQLI姿势对其各自的数据库的威胁,创建了两个相同的网站,使用MySQL数据库和另一个使用MySQL数据库MongoDB。攻击是使用在线登录表格到这些网站进行的。在网站上使用不同的注射技术,并记录了攻击的相对容易性。如果没有适当的措施,即琴弦的消毒,两者都同样容易受到影响,并且可以使用简单的对策来防止各种攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号