Skip to main content
Top
Published in: Journal of Computer Virology and Hacking Techniques 1/2015

01-02-2015 | Original Paper

MAC based solution for SQL injection

Authors: Diksha Gautam Kumar, Madhumita Chatterjee

Published in: Journal of Computer Virology and Hacking Techniques | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers’ lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique used to exploit code by altering back-end SQL statements through manipulating input. An attacker can directly compromise the database, that’s why this is a most threatening attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project [12]. It is probably the most common Website vulnerability today! Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented in all platforms or do not cover all types of SQL injection attacks. In this work we implement Detection Block model against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC static and dynamic query which is derived from entropy is compared to detect an attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shahriar, H., Zulkernine, M.: Information theoretic detection of SQL injection attacks. In: Proceedings of 14th International Symposium on High Assurance System Engineering (2012) Shahriar, H., Zulkernine, M.: Information theoretic detection of SQL injection attacks. In: Proceedings of 14th International Symposium on High Assurance System Engineering (2012)
2.
go back to reference Xue, Q., He, P.: On defense and detection of SQL server injection attack. In: Proceedings of International Conference on Security Systems, 978-1-4244-6252-0/11/, pp. 324–330. IEEE (2011) Xue, Q., He, P.: On defense and detection of SQL server injection attack. In: Proceedings of International Conference on Security Systems, 978-1-4244-6252-0/11/, pp. 324–330. IEEE (2011)
3.
go back to reference Balasundaram, I., Ramaraj, E.: An authentication scheme for preventing SQL injection attack using hybrid encryption (PSQLIA-HBE). Eur. J. Sci. Res. 53(3), 359–368 (2011, ISSN 1450–216X) Balasundaram, I., Ramaraj, E.: An authentication scheme for preventing SQL injection attack using hybrid encryption (PSQLIA-HBE). Eur. J. Sci. Res. 53(3), 359–368 (2011, ISSN 1450–216X)
4.
go back to reference Avireddy, S., Perumal, V., Gowraj, N., Kannan, R.S., Prashanth, S.: Random4: an application specific randomized encryption algorithm to prevent SQL injection. In: Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1327–1335. IEEE (2012) Avireddy, S., Perumal, V., Gowraj, N., Kannan, R.S., Prashanth, S.: Random4: an application specific randomized encryption algorithm to prevent SQL injection. In: Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1327–1335. IEEE (2012)
5.
go back to reference Zhang, K.-X., Lin, C.-J., Chen, S.-J., Hwang, Y.: TransSQL: a translation and validation-based solution for SQL-injection attacks. In: Proceedings of First International Conference on Robot, Vision and Signal Processing, pp. 248–252. IEEE (2011) Zhang, K.-X., Lin, C.-J., Chen, S.-J., Hwang, Y.: TransSQL: a translation and validation-based solution for SQL-injection attacks. In: Proceedings of First International Conference on Robot, Vision and Signal Processing, pp. 248–252. IEEE (2011)
6.
go back to reference Huang, B., Xie, T., Ma, Y.: Anti SQL injection with statements sequence digest. National Science Foundation of China, Scientific Research and Development Plan of Nanning City (No. 10876012). IEEE (2012) Huang, B., Xie, T., Ma, Y.: Anti SQL injection with statements sequence digest. National Science Foundation of China, Scientific Research and Development Plan of Nanning City (No. 10876012). IEEE (2012)
7.
go back to reference Mamadhan, S., Manesh T., Paul, V.: SQLStor: blockage of stored procedure SQL injection attack using dynamic query structure validation. (No. 978-1-4673-5119-5/12/\({\$}\)31.00c) IEEE, pp. 240–246. 2012 Mamadhan, S., Manesh T., Paul, V.: SQLStor: blockage of stored procedure SQL injection attack using dynamic query structure validation. (No. 978-1-4673-5119-5/12/\({\$}\)31.00c) IEEE, pp. 240–246. 2012
8.
go back to reference Kim, J.-G.: Injection attack detection using the removal of SQL query attribute values. 978-1-4244-9224-4/11/\({\$}\)26.00 \(\copyright \). IEEE (2011) Kim, J.-G.: Injection attack detection using the removal of SQL query attribute values. 978-1-4244-9224-4/11/\({\$}\)26.00 \(\copyright \). IEEE (2011)
9.
go back to reference Jueneman, R.R., Matyas, S.M., Meyer, C.H.: Message authentication. IEEE Commun. 23(9), 29–40 (1985)CrossRef Jueneman, R.R., Matyas, S.M., Meyer, C.H.: Message authentication. IEEE Commun. 23(9), 29–40 (1985)CrossRef
10.
go back to reference Johari, R., Sharma, P.: A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection. In: Proceedings of International Conference on Communication Systems and Network Technologies, pp. 453–459. IEEE (2012) Johari, R., Sharma, P.: A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection. In: Proceedings of International Conference on Communication Systems and Network Technologies, pp. 453–459. IEEE (2012)
11.
go back to reference Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL injection attacks and countermeasures. In: Proceedings of the International Symposium on Secure Software Engineering (ISSSE 2006) Mar (2006) Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL injection attacks and countermeasures. In: Proceedings of the International Symposium on Secure Software Engineering (ISSSE 2006) Mar (2006)
Metadata
Title
MAC based solution for SQL injection
Authors
Diksha Gautam Kumar
Madhumita Chatterjee
Publication date
01-02-2015
Publisher
Springer Paris
DOI
https://doi.org/10.1007/s11416-014-0219-6

Other articles of this Issue 1/2015

Journal of Computer Virology and Hacking Techniques 1/2015 Go to the issue

Premium Partner