A New Approach for SQL-Injection Detection

被引:0
|
作者
Shi, Cong-cong [1 ]
Zhang, Tao [1 ]
Yu, Yong [1 ]
Lin, Weimin [1 ]
机构
[1] State Grid Elect Power Res Inst, Nanjing 210003, Jiangsu, Peoples R China
关键词
self-learning; syntax tree; pattern marching; feature filtering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the deepening of information construction, Web architecture is widely used in various business systems. While presenting convenience, these new technologies also introduce great security risks. Web security has been a serious issue of information security, and SQL-injection is one of the most common means of attack against Web services. SQL Injection often changes the structure of SQL statements. This paper proposed a self-learning approach to counter SQL Injection which can learn automatically the structure feature of all legal SQL statements to construct knowledge library based on SQL syntax tree in safe environments, and then match every SQL statement with knowledge library to find whether the structural feature has been changed in real environments. If successful, this SQL statement is legal. SQL statements which fail pattern marching are not determined as illegal immediately. Then, we take depth-feature check based on Value-at-Risk, and identity the true illegal SQL statements. This method which combines mode-matching and character-filtering can reach good results. Experimental results prove that this proposed approach holds good performance and perfect protection for SQL Injection.
引用
收藏
页码:245 / 254
页数:10
相关论文
共 50 条
  • [21] Hybrid SQL Injection Detection System
    Priyaa, B. Deva
    Devi, M. Indra
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [22] Discussion on the detection and prevention of SQL injection
    Zhang, Xingzhong
    Zhang, Xiaojie
    APPLICATIONS OF ENGINEERING MATERIALS, PTS 1-4, 2011, 287-290 : 3047 - 3050
  • [23] Detection of SQL Injection Attacks by Removing the Parameter Values of SQL Query
    Katole, Rajashree A.
    Sherekar, Swati S.
    Thakare, Vilas M.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 736 - 741
  • [24] Evaluation of SQL Injection Detection and Prevention Techniques
    Tajpour, Atefeh
    Shooshtari, Mohammad JorJor Zade
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 216 - 221
  • [25] A Framework for the Detection and Prevention of SQL Injection Attacks
    Shafie, Emad
    Cau, Antonio
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 329 - 336
  • [26] SQL Injection Detection using Machine Learning
    Joshi, Anamika
    Geetha, V
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1111 - 1115
  • [27] A Taxonomy of SQL Injection Detection and Prevention Techniques
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abd Manaf, Azizah
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 53 - 56
  • [28] A survey on the detection of SQL injection attacks and their countermeasures
    Nagpal B.
    Chauhan N.
    Singh N.
    Journal of Information Processing Systems, 2017, 13 (04): : 689 - 702
  • [29] SQL injection attack: Detection, prioritization & prevention
    Paul, Alan
    Sharma, Vishal
    Olukoya, Oluwafemi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [30] SQL Injection Attack Detection using ResNet
    Sangeeta
    Nagasundari, S.
    Honnavali, Prasad B.
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,