An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching

被引:13
作者
Balasundaram, Indrani [1 ]
Ramaraj, E. [1 ]
机构
[1] Madurai Kamaraj Univ, Dept Comp Sci, Madurai 625021, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011 | 2012年 / 30卷
关键词
SQL Injection Attack; Web applications; Web security; Data validation;
D O I
10.1016/j.proeng.2012.01.850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of the Internet, web applications, such as online banking and web-based email, have become integral to many people's daily lives. Web applications have brought with them new classes of computer security vulnerabilities, such as SQL injection. It is a class of input validation based vulnerabilities. Typical uses of SQL injection leak confidential information from a database, by-pass authentication logic, or add unauthorized accounts to a database. This security prevents the unauthorized access to your database and also it prevents your data from being altered or deleted by users without the appropriate permissions. Malicious Text Detector, Constraint Validation, Query length validation and Text based Key Generator are the four types of filtration technique used to detect and prevent the SQL Injection Attacks from accessing the database (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of ICCTSD 2011
引用
收藏
页码:183 / 190
页数:8
相关论文
共 8 条
[1]  
Anley C., 2002, ADV SQL INJECTION SQ
[2]  
[Anonymous], 2005, INPROCEEDINGS 20 IEE
[3]  
Halfond A., 2006, P 14 ACM SIGSOFT INT, P175, DOI DOI 10.1145/1181775.1181797
[4]   WASP: Protecting web applications using positive tainting and syntax-aware evaluation [J].
Halfond, William G. J. ;
Orso, Alessandro ;
Manolios, Panagiotis .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :65-81
[5]  
Livshits VB, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P271
[6]  
Muthuprasanna KeWei, 2006, SQL INJECTION ATTACK
[7]   The essence of command injection attacks in web applications [J].
Su, ZD ;
Wassermann, G .
ACM SIGPLAN NOTICES, 2006, 41 (01) :372-382
[8]  
Sun S.T., 2009, LERSSETR2009032