Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection

被引:5
|
作者
Kuroki, Kotomi [1 ]
Kanemoto, Yo [1 ]
Aoki, Kazufumi [1 ]
Noguchi, Yasuhiro [2 ]
Nishigaki, Masakatsu [2 ]
机构
[1] NTT Secure Platform Labs, Tokyo, Japan
[2] Shizuoka Univ, Shizuoka, Japan
关键词
SQL injection; syntax analysis; emulation;
D O I
10.1109/COMPSAC48688.2020.00-41
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
SQL injections lead to serious damage such as leakage of personal information and are prevalent online. Web Application Firewalls (WAFs) are used to detect SQL injections, but its detection is not perfect. Therefore, to validate detected attacks, a more detailed manual analysis is required. Furthermore, due to confidentiality and availability, it is often impossible to obtain information on monitored web servers. In this paper, we propose a method to identify the intention of SQL injections in order to shorten the analysis time in the situation where limited information is available. The proposed method analyzes only a partial SQL query in an HTTP request and estimates its intention by syntax analysis and emulating. Evaluation results revealed that the proposed method was able to correctly identify the intention with an accuracy of 83.1% and 71.9% for an artificial dataset and a real-world dataset respectively.
引用
收藏
页码:1510 / 1515
页数:6
相关论文
共 50 条
  • [1] Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques
    Jesudoss, A.
    Mercy, Theresa M.
    Christy, A.
    Maheswari, M.
    Selvi, M.
    Ulagamuthalvi, V
    INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2022, 13 (04) : 262 - 267
  • [2] A Review of Database Forensic Analysis For SQL Injection Attack
    Rahman, Muhammad Razif A. B.
    Abd Manaf, Azizah
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 201 - 206
  • [3] Detecting SQL Vulnerability Attack based on the Dynamic and Static Analysis Technology
    Wang, Yaohui
    Wang, Dan
    Zhao, Wenbing
    Liu, Yuan
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 604 - 607
  • [4] SQL Injection Behavior Detection Method Based on AOP and Dynamic Taint Analysis
    He C.-W.
    Ye Z.-P.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (11): : 2413 - 2419
  • [5] Applied web Traffic Analysis for Numerical Encoding of SQL Injection Attack Features
    Uwagbole, Solomon Ogbomon
    Buchanan, William
    Fan, Lu
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 393 - 401
  • [6] A Detective Tool against SQL Injection Attacks Based on Static Analysis and Dynamic Monitor
    Liu, Zijian
    Xu, Lei
    2013 10TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA 2013), 2013, : 195 - +
  • [7] From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack
    Leppanen, Anna
    Toiviainen, Tero
    Kankaanranta, Terhi
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2020, 14 (01): : 63 - 80
  • [8] Cost analysis of the false data injection attack based on nonlinear state estimation
    Zhao L.
    Liu Z.
    Sun G.
    Ni M.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2019, 47 (19): : 38 - 45
  • [9] An intrusion intention analysis algorithm based on attack graph
    Zhu Z.
    Chai G.
    International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 643 - 650
  • [10] ANALYSIS OF SQL INJECTION ATTACK IN WEB SERVICE (A CASE STUDY OF WEBSITE IN ACEH PROVINCE)
    Munadi, Rizal
    Fajri, T. Surya
    Meutia, Ernita Dewi
    Elizar
    PROCEEDINGS OF 2013 3RD INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME), 2013, : 431 - 435