A Security Analysis Tool For Web Application Reinforcement Against SQL Injection Attacks (SQLIAs)

被引:0
|
作者
Lashkaripour, Z. [1 ]
Bafghi, A. Ghaemi [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp, Data & Commun Secur Lab, Fac Engn, Mashhad, Iran
关键词
Web application; SQLIA; transformation; static analysis; detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In SQLIA, attacker injects an input in the query in order to change the structure of the query intended by the programmer and therefore, gain access to the data in the underlying database. Due to the significance of the stored data, web application's security against SQLIA is vital. In this paper we propose a tool that is capable of reporting the transformations needed to reinforce the security of a Java-based web application and its database against SQLIAs. This tool which is based on static analysis and runtime validation uses our new technique for detection and prevention of SQLIAs. In our technique user inputs in SQL queries are removed and some information is gathered in order to make the detection easier and faster at runtime. According to these information the tool reports the transformations needed and the location of the transformations in source code and therefore after applying the transformations the result would be a reinforced web application against SQLIAs.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] A comparative analysis and performance evaluation of web application protection techniques against injection attacks
    Ali, Nabeel Salih
    Bin Shibghatullah, Abdul Samad
    Alhilali, Ahmed Hazim
    Al-Khammasi, Salam
    Kadhim, Mohammed Falih
    Fatlawi, Hayder K.
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (02) : 196 - 228
  • [22] SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
    Ali, Abdul Bashah Mat
    Shakhatreh, Ala' Yaseen Ibrahim
    Abdullah, Mohd Syazwan
    Alostad, Jasem
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [23] SECSIX: security engine for CSRF, SQL injection and XSS attacks
    Nagpal B.
    Chauhan N.
    Singh N.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 2) : 631 - 644
  • [24] Explorative Study of SQL Injection Attacks and Mechanisms to Secure Web Application Database- A Review
    Sharma, Chandershekhar
    Jain, S. C.
    Sharma, Arvind K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (03) : 79 - 87
  • [25] Frameworks for SQL Retrieval on Web Application Security
    Kim, Haeng Kon
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 748 - 752
  • [26] Testing Techniques and Analysis of SQL Injection Attacks
    Maraj, Arianit
    Rogova, Ermir
    Jakupi, Genc
    Grajqevci, Xheladin
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA), 2017, : 55 - 59
  • [27] Shielding Against SQL Injection Attacks Using ADMIRE Model
    Madan, Sushila
    Madan, Supriya
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 314 - +
  • [28] Detection of SQL Injection and XSS Attacks in Three Tier Web Applications
    Sonewar, Piyush A.
    Thosar, Sonali D.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [29] A Top Web Security Vulnerability SQL Injection attack - Survey
    Abirami, J.
    Devakunchari, R.
    Valliyammai, C.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [30] Secured Web Application Using Combination of Query Tokenization and Adaptive Method in Preventing SQL Injection Attacks
    Abu Othman, Noor Ashitah
    Ali, Fakariah Hani Mohd
    Noh, Mashyum Binti Mohd
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 472 - 476