A Security Analysis Tool For Web Application Reinforcement Against SQL Injection Attacks (SQLIAs)

被引:0
|
作者
Lashkaripour, Z. [1 ]
Bafghi, A. Ghaemi [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp, Data & Commun Secur Lab, Fac Engn, Mashhad, Iran
关键词
Web application; SQLIA; transformation; static analysis; detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In SQLIA, attacker injects an input in the query in order to change the structure of the query intended by the programmer and therefore, gain access to the data in the underlying database. Due to the significance of the stored data, web application's security against SQLIA is vital. In this paper we propose a tool that is capable of reporting the transformations needed to reinforce the security of a Java-based web application and its database against SQLIAs. This tool which is based on static analysis and runtime validation uses our new technique for detection and prevention of SQLIAs. In our technique user inputs in SQL queries are removed and some information is gathered in order to make the detection easier and faster at runtime. According to these information the tool reports the transformations needed and the location of the transformations in source code and therefore after applying the transformations the result would be a reinforced web application against SQLIAs.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] A Mapping-based Podel for Preventing Cross Site Scripting and SQL Injection Attacks on Web Application and its Impact Analysis
    Pandurang, Rathod Mahesh
    Karia, Deepak C.
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 414 - 418
  • [32] Using Web Application Construction Frameworks to Protect Against Code Injection Attacks
    Livshits, Benjamin
    Erlingsson, Ulfar
    PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2007, : 95 - 103
  • [33] Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning
    Xie, Zhiqiang
    Xiang, Yingxiao
    Li, Yike
    Zhao, Shuang
    Tong, Endong
    Niu, Wenjia
    Liu, Jiqiang
    Wang, Jian
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT I, 2022, 13155 : 660 - 675
  • [34] A Web Application Runtime Application Self-protection Scheme against Script Injection Attacks
    Yin, Zhongxu
    Li, Zhufeng
    Cao, Yan
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 566 - 577
  • [35] Automated protection of PHP applications against SQL-injection attacks
    Merlo, Ettore
    Letarte, Dominic
    Antoniol, Giuliano
    CSMR 2007: 11TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS: SOFWARE EVOLUTION IN COMPLEX SOFTWARE INTENSIVE SYSTEMS, 2007, : 191 - +
  • [36] Algorithm to Prevent Back End Database against SQL Injection Attacks
    Srivastava, Mahima
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 754 - 757
  • [37] A Metamodel for Web Application Injection Attacks and Countermeasures
    Holm, Hannes
    Ekstedt, Mathias
    TRENDS IN ENTERPRISE ARCHITECTURE RESEARCH AND PRACTICE-DRIVEN RESEARCH ON ENTERPRISE TRANSFORMATION, 2012, 131 : 198 - 217
  • [38] Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 365 - +
  • [39] Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling
    Zuech, Richard
    Hancock, John
    Khoshgoftaar, Taghi M.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 27 - 34
  • [40] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,