使用字符串匹配和LCS方法检测各种SQL注入漏洞

V. Anitha, A. Lakshmi, M. Revathi, K. Selvi
{"title":"使用字符串匹配和LCS方法检测各种SQL注入漏洞","authors":"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi","doi":"10.1109/ICOAC.2014.7229717","DOIUrl":null,"url":null,"abstract":"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Detecting various SQL Injection vulnerabilities using String Matching and LCS method\",\"authors\":\"V. Anitha, A. Lakshmi, M. Revathi, K. Selvi\",\"doi\":\"10.1109/ICOAC.2014.7229717\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.\",\"PeriodicalId\":325520,\"journal\":{\"name\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Sixth International Conference on Advanced Computing (ICoAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOAC.2014.7229717\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Sixth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2014.7229717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

现在很多人都在使用互联网来分享他们的个人和商业信息,这可能会有一个入侵者访问这些信息的机会。因此,有必要适当注意克服网页中的漏洞。SQLI (SQL注入)是一个常见的漏洞,入侵者试图使用SQL查询访问后端(数据库)。到目前为止,为了防止SQLI已经做了大量的研究工作,但这个问题仍然是一个挑战。因为,大多数技术将试图在一个角度解决问题,但在另一端也会有一个巨大的缺陷。因此,我们需要一个合适的系统来完全检测SQLI。在这里,我们在仔细审查现有方法后,提出了一个检测所有类型SQLI漏洞的系统。实验结果表明,与现有技术相比,该系统能够检测到所有类型的SQLI漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detecting various SQL Injection vulnerabilities using String Matching and LCS method
Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access the back end (database) using SQL Query. Lot of research work has been done so far in order to prevent SQLI but still the problem remains as a challenge. Since, most of the technique will try to fix the problem in one perspective but in the other end there will be a huge flaw too. Hence, we require a proper system to detect the SQLI completely. Here, we are presenting a system which detects all type of SQLI vulnerabilities after elaborately reviewing the existing methods. Experimental result shows that our proposed system detects all type of SQLI vulnerability when compared with the existing techniques.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信