首页> 外文期刊>International Journal on Computer Science and Engineering >SQL INJECTION ATTACK IN WEB APPLICATION AND ITS MITIGATION USING PREVENTION MECHANISM TO SECURE WEB APPLICATION DATABASE
【24h】

SQL INJECTION ATTACK IN WEB APPLICATION AND ITS MITIGATION USING PREVENTION MECHANISM TO SECURE WEB APPLICATION DATABASE

机译:使用预防机制保护Web应用程序数据库中Web应用程序中的SQL注入攻击及其缓解

获取原文
       

摘要

Now a day’s cyber-attacks are increasing extremely on web application, mobile apps, networks which are morevulnerable for websites, web application. In vulnerability Assessment and Penetration testing the most vulnerableattack on websites, web application is SQL Injection. SQL Injection is a type of attack in which attacker trying tofetch database by manipulating SQL Queries. SQL Injection is common but the most popular attack in which theattacker intercepts the http request in which SQL query is passed with parameters, so attacker gain the access onSQL database in backend. This attack is the most vulnerable because attacker attacks on the database of thewebsite and retrieves data from the tables. Authentication bypass, Data Breach, read source code from files on thedatabase server, admin panel access, web application firewall bypass (mod security) can be done with SQLInjection. In this research paper deal with how an attacker can bypass the web application firewall which isenabled before web site hosting, also developing mechanism which can be helpful to prevent the SQL Injection onthe websites, web-apps. I proposed model using a penetration testing technique which is useful to identify thefalse negative and false positive response of the WAF. This model guarantees the prevention of SQL Injection byapplying the custom whistling.
机译:如今,对于Web应用程序,移动应用程序,更易受网站攻击的网络,Web应用程序,当今的网络攻击正日益增加。在漏洞评估和渗透测试中,网站上最容易受到攻击的网站是SQL Injection。 SQL注入是一种攻击类型,攻击者试图通过操纵SQL查询来获取数据库。 SQL注入是常见的攻击,但最常见的攻击是攻击者拦截HTTP请求,在该请求中使用参数传递SQL查询,因此攻击者获得了后端对SQL数据库的访问。此攻击最容易受到攻击,因为攻击者攻击网站的数据库并从表中检索数据。可以使用SQLInjection完成身份验证绕过,数据违反,从数据库服务器上的文件读取源代码,管理面板访问,Web应用程序防火墙绕过(mod安全)。在这篇研究论文中,攻击者如何绕过在托管网站之前启用的Web应用程序防火墙,还开发出了有助于防止SQL注入网站,Web应用程序的机制。我提出了一种使用渗透测试技术的模型,该模型可用于识别WAF的假阴性和假阳性响应。此模型通过应用自定义吹口哨来确保防止SQL注入。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号