首页> 外文OA文献 >Exploring Defense of SQL Injection Attack in Penetration Testing
【2h】

Exploring Defense of SQL Injection Attack in Penetration Testing

机译:探索渗透测试中sQL注入攻击的防范

摘要

SQLIA is adopted to attack websites with and without confidential information. Hackers utilize the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims always are not aware of that their confidential information has been compromised for a long time. The contributions of this thesis are: (1) systematically explore SQLIA, SQLIA prevention in theory; (2) demonstrate, evaluate imitative SQLIA with open source SQLIA tools and SQLIA prevention tools in practice; (3) new filters for eliminating SQLIA evading IDS/IPS detection techniques to improve SQLIA prevention.The achievements of this thesis are to successfully obtain 637 copies replied questionaire of surveying open source SQLIA tools and open source SQLIA prevention tools in quantitative research. Up to 76 virtual websites which have not been installed any SQLIA prevention tools have been successfully compromised in 500 penetration tests by SQLIA experiments in virtual environment of qualitative research. Furthermore, 27 compromised virtual websites that are installed with SQLIA prevention tools have experiences 600 times penetration tests. The open source SQLIA prevention tools successfully prevent total 573 times out of 600 times SQLIA penetration tests. To conduct 100 times penetration tests for each new filters of eliminating SQL injection evading IDS/IPS detection and testing result shows that all new filters can successfully prevent evading techniques with a high percentage, but with some side effect.
机译:采用SQLIA攻击带有或不带有机密信息的网站。黑客利用受感染的网站作为中间代理来攻击其他人,从而避免犯下网络犯罪,并扩大了分布式拒绝服务攻击(DDoS)的规模。 DDoS是指黑客恶意关闭网站,并使网络用户无法使用网络资源。由于黑客采用各种逃避SQLIA入侵检测系统的技术,因此有效检测和阻止SQLIA极为困难。受害者始终不知道自己的机密信息已被破坏很长时间了。本论文的贡献是:(1)系统地探讨SQLIA,SQLIA的预防理论; (2)在实践中使用开源SQLIA工具和SQLIA预防工具演示,评估模拟SQLIA; (3)消除SQLIA逃避IDS / IPS检测技术的新过滤器,以提高SQLIA的预防能力。本论文的成果是成功获得637份问卷调查问卷,这些问卷是对开源SQLIA工具和开源SQLIA预防工具的定量研究。通过定性研究虚拟环境中的SQLIA实验,成功进行了500次渗透测试,成功破坏了多达76个尚未安装任何SQLIA预防工具的虚拟网站。此外,安装有SQLIA预防工具的27个受到破坏的虚拟网站已经进行了600次渗透测试。开源SQLIA预防工具成功阻止了600次SQLIA渗透测试中的573次。对每个新过滤器进行100次渗透测试,以消除逃避SQL注入的IDS / IPS检测和测试结果表明,所有新过滤器都可以成功地防止逃避技术的发生率很高,但有一些副作用。

著录项

  • 作者

    Zhu Yao Chu;

  • 作者单位
  • 年度 2016
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号