Skip to main content

2024 | OriginalPaper | Buchkapitel

SQL Injection Attack Detection and Prevention Based on Manipulating the SQL Query Input Attributes

verfasst von : R. Mahesh, Samuel Chellathurai, Meyyappan Thirunavukkarasu, Pandiselvam Raman

Erschienen in: Computational Sciences and Sustainable Technologies

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

SQL injection refers to one of the types of database attacks for web applications. The database security is compromised when wild card characters, malicious code, or malicious SQL query string are injected into the database. These changes in syntax and semantic allow the attacker to gain access to sensitive information and manipulate the database. Various techniques have been developed to detect and prevent this type of attacks. In this article, we proposed an method for preventing and detecting SQL injection. This method manipulates the SQL query input parameters and determining the distance between query strings. This method satisfies static query and dynamic also.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Anley, C.: Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd, White Paper (2002) Anley, C.: Advanced SQL Injection In SQL Server Applications. Next Generation Security Software Ltd, White Paper (2002)
3.
Zurück zum Zitat Gould, C., Su, Z., Devanbu, P.: JDBC checker: a static analysis tool for SQL/JDBC applications. In: Proceedings of the 26th International Conference on Software Engineering (ICSE), pp. 697–698 (2004) Gould, C., Su, Z., Devanbu, P.: JDBC checker: a static analysis tool for SQL/JDBC applications. In: Proceedings of the 26th International Conference on Software Engineering (ICSE), pp. 697–698 (2004)
4.
Zurück zum Zitat Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.T., Kuo, S.-Y.: Securing Web application code by static analysis and runtime protection. In: Proceedings of the 12th International World Wide Web Conference (WWW 2004), pp. 40–52 (2004) Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.T., Kuo, S.-Y.: Securing Web application code by static analysis and runtime protection. In: Proceedings of the 12th International World Wide Web Conference (WWW 2004), pp. 40–52 (2004)
5.
Zurück zum Zitat Halfond, W.G., Orso, A.: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In: ACM, ASE 2005, November 7–11 (2005) Halfond, W.G., Orso, A.: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In: ACM, ASE 2005, November 7–11 (2005)
6.
Zurück zum Zitat Buehrer, G., Weide, B.W., Sivilotti, P.A.G.: Using parse tree validation to prevent SQL injection attacks. In: Proceeding of the 5th International Workshop on Software Engineering and Middleware, pp. 106–113 ACM (2005) Buehrer, G., Weide, B.W., Sivilotti, P.A.G.: Using parse tree validation to prevent SQL injection attacks. In: Proceeding of the 5th International Workshop on Software Engineering and Middleware, pp. 106–113 ACM (2005)
7.
Zurück zum Zitat McClure, R., Krger, I.: SQL DOM: compile time checking of dynamic SQL statements. In: Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), pp. 88–96 (2005) McClure, R., Krger, I.: SQL DOM: compile time checking of dynamic SQL statements. In: Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), pp. 88–96 (2005)
8.
Zurück zum Zitat Buehrer, G., Weide, B.W., Sivilotti, P.A.: Using parse tree validation to prevent SQL InjectionAttacks, SEM 2005. In: Proceedings of the 5th international workshop on Software engineering and middleware, pp. 106–113 (2005) Buehrer, G., Weide, B.W., Sivilotti, P.A.: Using parse tree validation to prevent SQL InjectionAttacks, SEM 2005. In: Proceedings of the 5th international workshop on Software engineering and middleware, pp. 106–113 (2005)
9.
Zurück zum Zitat Halfond, W.G., Orso, A., Manolios, P.: Using positive tainting and syntax-aware evaluation to counter sql injection attacks. In: ACM-SIGSOFT, pp. 175–185 (2006) Halfond, W.G., Orso, A., Manolios, P.: Using positive tainting and syntax-aware evaluation to counter sql injection attacks. In: ACM-SIGSOFT, pp. 175–185 (2006)
10.
Zurück zum Zitat Su, Z., Wassermann, G.: The essence of command injection attacks in web applications. In: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 372–382 (2006) Su, Z., Wassermann, G.: The essence of command injection attacks in web applications. In: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 372–382 (2006)
11.
Zurück zum Zitat Rietta, F.S.: Application layer intrusion detection for SQL injection, ACM-SE 44. In: Proceedings of the 44th annual Southeast regional conference, pp. 531–536 (2006) Rietta, F.S.: Application layer intrusion detection for SQL injection, ACM-SE 44. In: Proceedings of the 44th annual Southeast regional conference, pp. 531–536 (2006)
12.
Zurück zum Zitat Wei, K., Muthuprasanna, M., Kothari, S.: Preventing SQL injection attacks in stored procedurce. In: Software Engineering Conference, pp. 18–21 (2006) Wei, K., Muthuprasanna, M., Kothari, S.: Preventing SQL injection attacks in stored procedurce. In: Software Engineering Conference, pp. 18–21 (2006)
13.
Zurück zum Zitat Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M., Takahama, Y.: Syntactic and semantic analysis for automated testing against SQL injection. In: Proceedings of the Computer Security Application Conference, pp. 107–117 (2007) Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M., Takahama, Y.: Syntactic and semantic analysis for automated testing against SQL injection. In: Proceedings of the Computer Security Application Conference, pp. 107–117 (2007)
14.
Zurück zum Zitat Bandhakavi, S., Bisht, P., Madhusudan, P., Venkatakrishnan, V.N.: CANDID: preventing SQL injection attacks using dynamic candidate evaluations. In: Proceedings of the Computer Security Application Conference, pp. 12–24 (2007) Bandhakavi, S., Bisht, P., Madhusudan, P., Venkatakrishnan, V.N.: CANDID: preventing SQL injection attacks using dynamic candidate evaluations. In: Proceedings of the Computer Security Application Conference, pp. 12–24 (2007)
15.
Zurück zum Zitat Rawat, R., Dangi, C.S., Patil, J.: Safe guards anomalies against SQL injection attacks. Int. J. Comput. Appl. 22(2), 11–14 (2011) Rawat, R., Dangi, C.S., Patil, J.: Safe guards anomalies against SQL injection attacks. Int. J. Comput. Appl. 22(2), 11–14 (2011)
16.
Zurück zum Zitat Das, D., Sharma, U., Bhattacharyya, D.K.: An approach to detection of SQL injection attack based on dynamic query matching. Int. J. Comput. Appl. 127(14), 15–24 (2010) Das, D., Sharma, U., Bhattacharyya, D.K.: An approach to detection of SQL injection attack based on dynamic query matching. Int. J. Comput. Appl. 127(14), 15–24 (2010)
17.
Zurück zum Zitat Ciampa, A., Visaggio, C.A., Di Penta, M.: A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications. In: SESS 2010: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, pp. 43–49 (2010) Ciampa, A., Visaggio, C.A., Di Penta, M.: A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications. In: SESS 2010: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, pp. 43–49 (2010)
18.
Zurück zum Zitat Lee, I., Jeong, S., Yeo, S., Moon, J.: Novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55(1–2), 58–68 (2012)MathSciNetCrossRef Lee, I., Jeong, S., Yeo, S., Moon, J.: Novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55(1–2), 58–68 (2012)MathSciNetCrossRef
19.
Zurück zum Zitat Kar, D., Panigrahi, S., Sundararajan, S.: SQLiGoT: detecting SQL injection attacks using graph of tokens and SVM. Comput. Secur. 60, 206–225 (2016)CrossRef Kar, D., Panigrahi, S., Sundararajan, S.: SQLiGoT: detecting SQL injection attacks using graph of tokens and SVM. Comput. Secur. 60, 206–225 (2016)CrossRef
20.
Zurück zum Zitat Li, Q., Wang, F., Wang, J., Li, W.: LSTM-based SQL injection detection method for intelligent transportation system. IEEE Trans. Veh. Technol. 68(5), 4182–4191 (2019) Li, Q., Wang, F., Wang, J., Li, W.: LSTM-based SQL injection detection method for intelligent transportation system. IEEE Trans. Veh. Technol. 68(5), 4182–4191 (2019)
21.
Zurück zum Zitat Gu, H., et al.: DIAVA: a traffic-based framework for detection of SQL injection attacks and vulnerability analysis of leaked data. IEEE Trans. Reliab. 69(1), 188–202 (2020)CrossRef Gu, H., et al.: DIAVA: a traffic-based framework for detection of SQL injection attacks and vulnerability analysis of leaked data. IEEE Trans. Reliab. 69(1), 188–202 (2020)CrossRef
22.
Zurück zum Zitat Liu, M., Li, K., Chen, T.: DeepSQLi: deep semantic learning for testing SQL injection, ISSTA 2020. In: Proceedings of the 29th ACM SIGSOFT, pp. 286–297 (2020) Liu, M., Li, K., Chen, T.: DeepSQLi: deep semantic learning for testing SQL injection, ISSTA 2020. In: Proceedings of the 29th ACM SIGSOFT, pp. 286–297 (2020)
Metadaten
Titel
SQL Injection Attack Detection and Prevention Based on Manipulating the SQL Query Input Attributes
verfasst von
R. Mahesh
Samuel Chellathurai
Meyyappan Thirunavukkarasu
Pandiselvam Raman
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-50993-3_17

Premium Partner