A Security Analysis Tool For Web Application Reinforcement Against SQL Injection Attacks (SQLIAs)

被引:0
|
作者
Lashkaripour, Z. [1 ]
Bafghi, A. Ghaemi [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp, Data & Commun Secur Lab, Fac Engn, Mashhad, Iran
关键词
Web application; SQLIA; transformation; static analysis; detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In SQLIA, attacker injects an input in the query in order to change the structure of the query intended by the programmer and therefore, gain access to the data in the underlying database. Due to the significance of the stored data, web application's security against SQLIA is vital. In this paper we propose a tool that is capable of reporting the transformations needed to reinforce the security of a Java-based web application and its database against SQLIAs. This tool which is based on static analysis and runtime validation uses our new technique for detection and prevention of SQLIAs. In our technique user inputs in SQL queries are removed and some information is gathered in order to make the detection easier and faster at runtime. According to these information the tool reports the transformations needed and the location of the transformations in source code and therefore after applying the transformations the result would be a reinforced web application against SQLIAs.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
    IndraniBalasundaram
    Ramaraj, E.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 197 - 205
  • [42] phpSAFE: A Security Analysis Tool for OOP Web Application Plugins
    Nunes, Paulo
    Fonseca, Jose
    Vieira, Marco
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 299 - 306
  • [43] Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks
    AL-Maliki, Manar Hasan Ali
    Jasim, Mahdi Nsaif
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3773 - 3782
  • [44] Design for security test against fault injection attacks
    Shao, Cuiping
    Li, Huiyun
    Xu, Guoqing
    Xiong, Liying
    ELECTRONICS LETTERS, 2014, 50 (23) : 1677 - U119
  • [45] Behind an Application Firewall, Are We Safe from SQL Injection Attacks?
    Appelt, Dennis
    Nguyen, Cu D.
    Briand, Lionel
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2015,
  • [46] A new algorithm for detecting SQL injection attack in Web application
    Lounis, Ouarda
    Guermeche, Salah Eddine Bouhouita
    Saoudi, Lalia
    Benaicha, Salah Eddine
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 589 - 594
  • [47] SQL-injection security evolution analysis in PHP
    Merlo, Ettore
    Letarte, Dominic
    Antoniol, Giuliano
    WSE 2007: NINTH IEEE INTERNATIONAL SYMPOSIUM ON WEB SITE EVOLUTION, PROCEEDINGS, 2007, : 45 - 49
  • [48] Black-Box Adversarial Attacks Against SQL Injection Detection Model
    Alqhtani, Maha
    Alghazzawi, Daniyal
    Alarifi, Suaad
    CONTEMPORARY MATHEMATICS, 2024, 5 (04): : 5098 - 5112
  • [49] Protecting Web Applications from SQL Injection Attacks by using Framework and Database Firewall
    Manikanta, Yakkala V. Naga
    Sardana, Anjali
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 609 - 613
  • [50] SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud
    Singh, Niharika
    Singh, Ashutosh Kumar
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2019, 27 (01): : 159 - 174