Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack

Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman
{"title":"Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack","authors":"Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman","doi":"10.1109/ISCAIE.2014.7010210","DOIUrl":null,"url":null,"abstract":"Since the past 20 years the uses of web in daily life is increasing and becoming trend now. As the use of the web is increasing, the use of web application is also increasing. Apparently most of the web application exists up to today have some vulnerability that could be exploited by unauthorized person. Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. Usually the developers of web applications did not realize that their web applications have vulnerabilities. They only realize them when there is an attack or manipulation of their code by someone. This is normal as in a web application, there are thousands of lines of code, therefore it is not easy to detect if there are some loopholes. Nowadays as the hacking tools and hacking tutorials are easier to get, lots of new hackers are born. Even though SQL injection is very easy to protect against, there are still large numbers of the system on the internet are vulnerable to this type of attack because there will be a few subtle condition that can go undetected. Therefore, in this paper we propose a detection model for detecting and recognizing the web vulnerability which is; SQL Injection based on the defined and identified criteria. In addition, the proposed detection model will be able to generate a report regarding the vulnerability level of the web application. As the consequence, the proposed detection model should be able to decrease the possibility of the SQL Injection attack that can be launch onto the web application.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAIE.2014.7010210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 33

Abstract

Since the past 20 years the uses of web in daily life is increasing and becoming trend now. As the use of the web is increasing, the use of web application is also increasing. Apparently most of the web application exists up to today have some vulnerability that could be exploited by unauthorized person. Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. Usually the developers of web applications did not realize that their web applications have vulnerabilities. They only realize them when there is an attack or manipulation of their code by someone. This is normal as in a web application, there are thousands of lines of code, therefore it is not easy to detect if there are some loopholes. Nowadays as the hacking tools and hacking tutorials are easier to get, lots of new hackers are born. Even though SQL injection is very easy to protect against, there are still large numbers of the system on the internet are vulnerable to this type of attack because there will be a few subtle condition that can go undetected. Therefore, in this paper we propose a detection model for detecting and recognizing the web vulnerability which is; SQL Injection based on the defined and identified criteria. In addition, the proposed detection model will be able to generate a report regarding the vulnerability level of the web application. As the consequence, the proposed detection model should be able to decrease the possibility of the SQL Injection attack that can be launch onto the web application.
SQL注入攻击检测模型:一种防止web应用程序遭受SQL注入攻击的方法
在过去的20年里,网络在日常生活中的使用越来越多,现在已经成为一种趋势。随着web的使用越来越多,web应用程序的使用也越来越多。显然,到目前为止,大多数web应用程序都存在一些可能被未经授权的人利用的漏洞。一些众所周知的web应用程序漏洞是结构化查询语言(SQL)注入,跨站点脚本(XSS)和跨站点请求伪造(CSRF)。通过利用这些web应用程序漏洞,系统破解者可以获得有关用户的信息,并导致相应组织的声誉受损。通常,web应用程序的开发人员并没有意识到他们的web应用程序存在漏洞。只有当有人攻击或操纵他们的代码时,他们才会意识到这些漏洞。这是正常的,因为在web应用程序中,有数千行代码,因此不容易检测到是否存在一些漏洞。如今,由于黑客工具和黑客教程更容易获得,许多新的黑客诞生了。尽管SQL注入很容易防范,但互联网上仍然有大量的系统容易受到这种类型的攻击,因为会有一些微妙的情况无法被检测到。因此,本文提出了一种检测和识别web漏洞的检测模型,该模型为;SQL注入基于定义和识别的标准。此外,建议的检测模型将能够生成关于web应用程序的漏洞级别的报告。因此,所提出的检测模型应该能够降低对web应用程序发起SQL注入攻击的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信