A Component Based SQL Injection Vulnerability Detection Tool

被引:0
作者
Aliero, Muhammmad Saidu [1 ]
Ghani, Imran [1 ]
机构
[1] Univ Tecknol Malaysia, Fac Comp, Skudai 81310, Johor Bahru, Malaysia
来源
2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MYSEC2015) | 2015年
关键词
SQLIV; SQL injection; Web-based; Vulnerability; Component based;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web database driving applications. Attackers' use SQLIA to get unauthorized access to and perform unauthorized data modification. To mitigate the devastating problem of SQLIA, different researchers proposed variety of web penetration testing tools that automation of SQLI vulnerability assessment that result in SQLIA. Recent study shows that there is need for adaptation of object orienting approach in development of application program in order to reduce the cost of integration and maintenance, as well as improve the efficiency of application programs. Most of the proposed SQLIV (SQL injection vulnerability) detection tools by academic researchers seem to focus on improving efficiency or effectiveness of SQLIV detection tool thereby paying less attention to advantage of adopting reusable component. Therefore, this paper propose component based (CBC) SQLIV detection tool that has the potential to enable developer to reuse component where necessary and allow integration and maintenance fast and in less cost. The proposed tool was tested on three different vulnerable web applications after which its effectiveness was compared against seven(7) different SQLIV detection tool accordingly, the result of evaluation proves that the tool has all the potential to detect SQLIV vulnerabilities on different scenarios that other of scanners ware unable to detect.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 28 条
[1]  
[Anonymous], 2014, APPL VULN TRENDS REP
[2]  
[Anonymous], 2005, INPROCEEDINGS 20 IEE
[3]  
[Anonymous], 2013, International Journal of Advancements in Computing Technology, DOI DOI 10.4156/IJACT.VOL5.ISSUE9.115
[4]  
Antunes N, 2010, WEB SERV ICWS 2010 I
[5]  
Brandman O., 2000, PERFORMANCE ARCHITEC
[6]  
Chad D., 2012, PRACTICAL IDENTIFICA
[7]  
Chen Shay, 2011, SECURITY TOOL BENCHM
[8]  
Ciampa A., 2010, P 2010 ICSE WORKSHOP, P43, DOI DOI 10.1145/1809100.1809107
[9]  
Clarke Russell, 2010, IS OPEN SOURCE SOFTW
[10]  
Doup e, 2012, P USENIX SEC S, P523