A New Approach for SQL-Injection Detection

被引:0
|
作者
Shi, Cong-cong [1 ]
Zhang, Tao [1 ]
Yu, Yong [1 ]
Lin, Weimin [1 ]
机构
[1] State Grid Elect Power Res Inst, Nanjing 210003, Jiangsu, Peoples R China
关键词
self-learning; syntax tree; pattern marching; feature filtering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the deepening of information construction, Web architecture is widely used in various business systems. While presenting convenience, these new technologies also introduce great security risks. Web security has been a serious issue of information security, and SQL-injection is one of the most common means of attack against Web services. SQL Injection often changes the structure of SQL statements. This paper proposed a self-learning approach to counter SQL Injection which can learn automatically the structure feature of all legal SQL statements to construct knowledge library based on SQL syntax tree in safe environments, and then match every SQL statement with knowledge library to find whether the structural feature has been changed in real environments. If successful, this SQL statement is legal. SQL statements which fail pattern marching are not determined as illegal immediately. Then, we take depth-feature check based on Value-at-Risk, and identity the true illegal SQL statements. This method which combines mode-matching and character-filtering can reach good results. Experimental results prove that this proposed approach holds good performance and perfect protection for SQL Injection.
引用
收藏
页码:245 / 254
页数:10
相关论文
共 50 条
  • [31] SQL Injection Detection and Prevention Tools Assessment
    Tajpour, Atefeh
    Heydari, Mohammad Zaman
    Masrom, Maslin
    Ibrahim, Suhaimi
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 518 - 522
  • [32] Feature Ratio Method: A Payload Feature Extraction and Detection Approach for SQL Injection Attacks
    Zhang, Shengyuan
    Li, Yuhong
    Jiang, Quan
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 172 - 175
  • [33] A Hot Query Bank approach to improve detection performance against SQL injection attacks
    Chung, Yu-Chi
    Wu, Ming-Chuan
    Chen, Yih-Chang
    Chang, Wen-Kui
    COMPUTERS & SECURITY, 2012, 31 (02) : 233 - 248
  • [34] On Defense and Detection of SQL SERVER Injection Attack
    Xue, Qian
    He, Peng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [35] A deep learning approach based on multi-view consensus for SQL injection detection
    Kakisim, Arzu Gorgulu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (2) : 1541 - 1556
  • [36] SQL Injection Detection and Prevention Tools Assessment
    Tajpour, Atefeh
    Masrom, Maslin
    Heydari, Mohammad Zama
    Ibrahim, Suhaimi
    PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 730 - 731
  • [37] A Survey on SQL Injection Attacks, Detection and Prevention
    Hu, Jianwei
    Zhao, Wei
    Cui, Yanpeng
    ICMLC 2020: 2020 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2018, : 483 - 488
  • [38] A deep learning approach based on multi-view consensus for SQL injection detection
    Arzu Gorgulu Kakisim
    International Journal of Information Security, 2024, 23 : 1541 - 1556
  • [39] OBJECT ORIENTED APPROACH TO SQL INJECTION PREVENTER
    Giri, D. Ratna
    Kumar, S. Praveen
    Prasannakumar, L.
    Murthy, R. N. V. Vishnu
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [40] A Mutation Approach of Detecting SQL Injection Vulnerabilities
    Huang, Yanyu
    Fu, Chuan
    Chen, Xuan
    Guo, Hao
    He, Xiaoyu
    Li, Jin
    Liu, Zheli
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 175 - 188