Method for Mining Security Vulnerabilities of Data Storage of Electric Power Internet of Things Based On Spark Framework and RASP Technology

Jianfei Chen, Huijun Du, Zhonglong Wang, Nianming Xue, Jia Peng, Wenjing Li
{"title":"Method for Mining Security Vulnerabilities of Data Storage of Electric Power Internet of Things Based On Spark Framework and RASP Technology","authors":"Jianfei Chen, Huijun Du, Zhonglong Wang, Nianming Xue, Jia Peng, Wenjing Li","doi":"10.1109/ICKECS56523.2022.10059626","DOIUrl":null,"url":null,"abstract":"The construction of power IoT (Internet of things) will greatly change the existing power business model and professional system, and will inevitably impact the data storage security of power IoT business. Due to the negligence or omission of the database designer in the process of designing and developing the database, there are a lot of security holes in the database, which makes the attacker successfully attack the database. In this paper, the research on data storage security vulnerability mining method of power IoT based on Spark framework and RASP technology is carried out. This paper puts forward a vulnerability mining methodology, which can be used to mine more potential vulnerabilities in Oracle more universally. In this way, the anonymous block is passed in as a parameter, and it is processed with the caller's permission instead of the definer's permission. Therefore, the attacker can only run the injected anonymous block with his own low permission, and can't achieve the attack purpose. The research results show that the algorithm designed in this paper will not be affected by memory space, so the mining efficiency of big data local frequent itemsets mining algorithm designed in this paper based on Spark framework will be much higher than that of traditional Apriori algorithm and FP-Growth algorithm. The mining performance of this method is better than that of the latter in three vulnerability types: injection vulnerability, XSS and CSRF.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICKECS56523.2022.10059626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The construction of power IoT (Internet of things) will greatly change the existing power business model and professional system, and will inevitably impact the data storage security of power IoT business. Due to the negligence or omission of the database designer in the process of designing and developing the database, there are a lot of security holes in the database, which makes the attacker successfully attack the database. In this paper, the research on data storage security vulnerability mining method of power IoT based on Spark framework and RASP technology is carried out. This paper puts forward a vulnerability mining methodology, which can be used to mine more potential vulnerabilities in Oracle more universally. In this way, the anonymous block is passed in as a parameter, and it is processed with the caller's permission instead of the definer's permission. Therefore, the attacker can only run the injected anonymous block with his own low permission, and can't achieve the attack purpose. The research results show that the algorithm designed in this paper will not be affected by memory space, so the mining efficiency of big data local frequent itemsets mining algorithm designed in this paper based on Spark framework will be much higher than that of traditional Apriori algorithm and FP-Growth algorithm. The mining performance of this method is better than that of the latter in three vulnerability types: injection vulnerability, XSS and CSRF.
基于Spark框架和RASP技术的电力物联网数据存储安全漏洞挖掘方法
电力物联网(IoT)的建设将极大地改变现有的电力商业模式和专业体系,不可避免地影响电力物联网业务的数据存储安全。由于数据库设计者在设计和开发数据库过程中的疏忽或遗漏,导致数据库中存在大量的安全漏洞,使得攻击者能够成功地对数据库进行攻击。本文对基于Spark框架和RASP技术的电力物联网数据存储安全漏洞挖掘方法进行了研究。本文提出了一种漏洞挖掘方法,该方法可以更普遍地挖掘Oracle中更多的潜在漏洞。通过这种方式,匿名块作为参数传入,并在调用者的许可而不是定义者的许可下处理它。因此,攻击者只能以自己的低权限运行注入的匿名块,无法达到攻击目的。研究结果表明,本文设计的算法不会受到内存空间的影响,因此基于Spark框架设计的大数据局部频繁项集挖掘算法的挖掘效率将大大高于传统的Apriori算法和FP-Growth算法。在注入漏洞、XSS和CSRF三种漏洞类型中,该方法的挖掘性能优于后者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信