Hybrid Approach to Detect SQLi Attacks and Evasion Techniques

被引:3
|
作者
Makiou, Abdelhamid [1 ]
Begriche, Youcef [1 ]
Serhrouchni, Ahmed [1 ]
机构
[1] Telecom Paristech, 48 Rue Barrault, F-75013 Paris, France
关键词
SQL injection; Web Application Firewall; HTTP dissection; machine learning; Security rules;
D O I
10.4108/icst.collaboratecom.2014.257568
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our model is a hybrid Injection Prevention System (HIPS) which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules.
引用
收藏
页码:452 / 456
页数:5
相关论文
共 50 条
  • [41] Analyzer Router: An Approach to Detect and Recover from OSPF Attacks
    Sangroha, Deepak
    Gupta, Vishal
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 370 - 378
  • [42] A Cross-protocol approach to detect TCP Hijacking attacks
    Barry, Bazara I. A.
    Chan, H. Anthony
    [J]. ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 57 - 60
  • [43] TOGBAD-an approach to detect routing attacks in tactical environments
    Gerhards-Padilla, Elmer
    Aschenbruck, Nils
    Martini, Peter
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 793 - 806
  • [44] AN ABNORMAL-BASED APPROACH TO EFFECTIVELY DETECT DDOS ATTACKS
    Li, Ke
    Zhou, Wanlei
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2009, 32 (07) : 889 - 895
  • [45] Deep Neural Network approach to detect GNSS Spoofing Attacks
    Borhani-Darian, Parisa
    Li, Haoqing
    Wu, Peng
    Closas, Pau
    [J]. PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 3241 - 3252
  • [46] SVM approach with CTNT to detect DDoS attacks in grid computing
    Seo, J
    Lee, C
    Shon, T
    Moon, J
    [J]. GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 59 - 70
  • [47] Baseline - A passive approach to tolerate and detect DoS/DDoS attacks
    Jin, S
    Liu, FY
    Xu, MW
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 104 - 110
  • [48] A practical physical watermarking approach to detect replay attacks in a CPS
    Ahmed, Chuadhry Mujeeb
    Palleti, Venkata Reddy
    Mishra, Vishrut Kumar
    [J]. JOURNAL OF PROCESS CONTROL, 2022, 116 : 136 - 146
  • [49] Deep Learning Approach to Detect Malicious Attacks at System Level
    Soni, Jayesh
    Prabakar, Nagarajan
    Upadhyay, Himanshu
    [J]. PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 314 - 315
  • [50] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
    Girma, Anteneh
    Garuba, Moses
    Li, Jiang
    Liu, Chunmei
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217