首页> 外文期刊>Research journal of engineering and technology >Combinatorial Approach to Prevent SQL Injection Attack
【24h】

Combinatorial Approach to Prevent SQL Injection Attack

机译:防止SQL注入攻击的组合方法

获取原文
获取原文并翻译 | 示例
           

摘要

As more businesses and organizations provide online services, the number of web sites or applications which arc linked to a database has increased greatly. Often the data held in such databases is confidential or private - and possibly of great interest to a hacker, disgruntled employee, or criminal group. While the database and the server holding it may have been secured, the design of the web interface is often overlooked and could allow unauthorized users access to the database. SQL injection, the use of database commands in the SQL language where user input is expected, remains a top threat. It was the 3rd listed error in the January 2009 "CWE/SANS Top 25 Most Dangerous Programming Errors"[a] and has been the mechanism for a number of prevalent attacks. For example, through most of 2008 there were ongoing, indiscriminate and widespread attacks on vulnerable web sites, which added a link to a malicious file (usually JavaScript) that most web site visitors would unintentionally run on loading the page. This then caused the visitor's computer to be infected with malware. Even well-known and widely trusted web sites were affected by this problem. This document will illustrate some of the main techniques used in SQL injection, then describe methods that can reduce the effectiveness of such attacks. In addition to usual standard IT best practice, such as logging and regular and prompt patching, the majority of SQL injection vulnerabilities can be moderated through careful and robust programming. It is hoped that the information provided here will highlight the seriousness of leaving this type of flaw unaddressed and promote the improved design of dalabasc-linked Internet resources.
机译:随着越来越多的企业和组织提供在线服务,链接到数据库的网站或应用程序的数量大大增加。通常,此类数据库中保存的数据是机密或私有的,并且可能引起黑客,心怀不满的员工或犯罪集团的极大兴趣。虽然数据库和保存该数据库的服务器已得到保护,但通常会忽略Web界面的设计,并且可能允许未经授权的用户访问数据库。 SQL注入仍然是最大的威胁,SQL注入是希望用户输入的SQL语言中的数据库命令的使用。它是2009年1月“ CWE / SANS排名前25位最危险的编程错误” [a]中列出的第3个错误,并且已成为许多流行攻击的机制。例如,在2008年的大部分时间里,对易受攻击的网站的攻击正在进行,不加区别地且广泛地受到攻击,从而增加了指向恶意文件(通常是JavaScript)的链接,大多数网站访问者在加载页面时会无意中运行这些文件。然后,这导致访问者的计算机感染了恶意软件。甚至知名和广受信任的网站也受到此问题的影响。本文档将说明SQL注入中使用的一些主要技术,然后介绍可降低此类攻击有效性的方法。除了常规的标准IT最佳实践(例如日志记录和常规补丁程序和即时补丁程序)外,大多数SQL注入漏洞都可以通过仔细而强大的编程来缓解。希望此处提供的信息将突出指出解决此类缺陷的严重性,并促进与dalabasc链接的Internet资源的改进设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号