SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker

S. Djanali, F. X. Arunanto, B. Pratomo, H. Studiawan, Satrio Gita Nugraha
{"title":"SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker","authors":"S. Djanali, F. X. Arunanto, B. Pratomo, H. Studiawan, Satrio Gita Nugraha","doi":"10.1109/ISTMET.2014.6936499","DOIUrl":null,"url":null,"abstract":"One of the most common security attack for web application is SQL injection. It is an attack to acquire access to application's database through injection of script or malicious query attributes. This attack can be executed in any page of web application which interacts with database. SQL injection could be more dangerous if the victim was an enterprise system such as online banking. Many methods have been researched and developed to prevent SQL injection attacks. One of them is the use of a honeypot. This paper proposed a method for increasing system's capability to detect and prevent SQL injection attacks based on removal of SQL query attribute values and honeypot for trapping attackers. A honeypot is placed as decoy system to hide actual web server from attacker. Malicious queries from attackers will be sent to honeypot while normal queries will be sent directly to the real web server. Honeypot is also used to provide activity logging of each attack which can be used for further analysis. We play with Raspberry Pi because it is cheap and effective to be used as a honeypot. Due to its limited computational ability, we make cluster to improve its power. Based on conducted experiments, we could achieve up to 64% accuracy of SQL injection attack. Moreover, with the redirection, our honeypot could get more attack data to be analyzed.","PeriodicalId":364834,"journal":{"name":"2014 International Symposium on Technology Management and Emerging Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Symposium on Technology Management and Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTMET.2014.6936499","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

One of the most common security attack for web application is SQL injection. It is an attack to acquire access to application's database through injection of script or malicious query attributes. This attack can be executed in any page of web application which interacts with database. SQL injection could be more dangerous if the victim was an enterprise system such as online banking. Many methods have been researched and developed to prevent SQL injection attacks. One of them is the use of a honeypot. This paper proposed a method for increasing system's capability to detect and prevent SQL injection attacks based on removal of SQL query attribute values and honeypot for trapping attackers. A honeypot is placed as decoy system to hide actual web server from attacker. Malicious queries from attackers will be sent to honeypot while normal queries will be sent directly to the real web server. Honeypot is also used to provide activity logging of each attack which can be used for further analysis. We play with Raspberry Pi because it is cheap and effective to be used as a honeypot. Due to its limited computational ability, we make cluster to improve its power. Based on conducted experiments, we could achieve up to 64% accuracy of SQL injection attack. Moreover, with the redirection, our honeypot could get more attack data to be analyzed.
SQL注入检测与防御系统利用树莓派蜜罐集群捕获攻击者
SQL注入是web应用程序最常见的安全攻击之一。通过注入脚本或恶意查询属性获取对应用程序数据库的访问权是一种攻击。这种攻击可以在与数据库交互的web应用程序的任何页面上执行。如果受害者是企业系统(如网上银行),SQL注入可能会更加危险。已经研究和开发了许多方法来防止SQL注入攻击。其中之一就是蜜罐的使用。本文提出了一种基于去除SQL查询属性值和蜜罐陷阱攻击者的方法来提高系统检测和防范SQL注入攻击的能力。一个蜜罐被放置作为诱饵系统,以隐藏真实的web服务器对攻击者。攻击者的恶意查询将被发送到蜜罐,而正常的查询将被直接发送到真实的web服务器。蜜罐还用于提供每次攻击的活动日志记录,可用于进一步分析。我们之所以使用树莓派,是因为它作为蜜罐既便宜又有效。由于它的计算能力有限,我们通过集群来提高它的计算能力。通过实验,我们可以实现高达64%的SQL注入攻击准确率。此外,通过重定向,我们的蜜罐可以获得更多的攻击数据进行分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信