A New Approach for SQL-Injection Detection

被引:0
|
作者
Shi, Cong-cong [1 ]
Zhang, Tao [1 ]
Yu, Yong [1 ]
Lin, Weimin [1 ]
机构
[1] State Grid Elect Power Res Inst, Nanjing 210003, Jiangsu, Peoples R China
关键词
self-learning; syntax tree; pattern marching; feature filtering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the deepening of information construction, Web architecture is widely used in various business systems. While presenting convenience, these new technologies also introduce great security risks. Web security has been a serious issue of information security, and SQL-injection is one of the most common means of attack against Web services. SQL Injection often changes the structure of SQL statements. This paper proposed a self-learning approach to counter SQL Injection which can learn automatically the structure feature of all legal SQL statements to construct knowledge library based on SQL syntax tree in safe environments, and then match every SQL statement with knowledge library to find whether the structural feature has been changed in real environments. If successful, this SQL statement is legal. SQL statements which fail pattern marching are not determined as illegal immediately. Then, we take depth-feature check based on Value-at-Risk, and identity the true illegal SQL statements. This method which combines mode-matching and character-filtering can reach good results. Experimental results prove that this proposed approach holds good performance and perfect protection for SQL Injection.
引用
收藏
页码:245 / 254
页数:10
相关论文
共 50 条
  • [1] SQL-IDS: A Specification-based Approach for SQL-Injection Detection
    Kemalis, Konstantinos
    Tzouramanis, Theodoros
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2153 - 2158
  • [2] Automatic vulnerability detection algorithm for the SQL-injection
    Rakhmanov A.T.
    Khamdamov R.K.
    Kerimov K.F.
    Kamalov S.K.
    Journal of Automation and Information Sciences, 2019, 51 (07): : 47 - 54
  • [3] SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
    Ali, Abdul Bashah Mat
    Shakhatreh, Ala' Yaseen Ibrahim
    Abdullah, Mohd Syazwan
    Alostad, Jasem
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [4] Generation of SQL-injection free secure algorithm to detect and prevent SQL-injection attacks
    Natarajan, Kanchana
    Subramani, Sarala
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 790 - 796
  • [5] SQL-injection security evolution analysis in PHP
    Merlo, Ettore
    Letarte, Dominic
    Antoniol, Giuliano
    WSE 2007: NINTH IEEE INTERNATIONAL SYMPOSIUM ON WEB SITE EVOLUTION, PROCEEDINGS, 2007, : 45 - 49
  • [6] Automated protection of PHP applications against SQL-injection attacks
    Merlo, Ettore
    Letarte, Dominic
    Antoniol, Giuliano
    CSMR 2007: 11TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS: SOFWARE EVOLUTION IN COMPLEX SOFTWARE INTENSIVE SYSTEMS, 2007, : 191 - +
  • [7] An approach for SQL injection vulnerability detection
    Mei Junjin
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1411 - 1414
  • [8] SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud
    Singh, Niharika
    Singh, Ashutosh Kumar
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2019, 27 (01): : 159 - 174
  • [9] Correlation Approach for SQL Injection Attacks Detection
    Choras, Michal
    Kozik, Rafal
    Puchalski, Damian
    Holubowicz, Witold
    INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 177 - +
  • [10] An Improved Approach for SQL Injection Vulnerabilities Detection
    Zhang, Zongzhi
    Wen, Qiaoyan
    Zhang, Zhao
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020