Improving Web Application Firewalls to Detect Advanced SQL Injection Attacks

被引:0
作者
Makiou, Abdelhamid [1 ]
Begriche, Youcef [1 ]
Serhrouchni, Ahmed [1 ]
机构
[1] Telecom Paristech, 46 Rue Barrault, F-75013 Paris, France
来源
2014 10TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS) | 2014年
关键词
SQL injection; Web Application Firewall; HTTP dissection; machine learning; Security rules;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our model is a hybrid Injection Prevention System (HIPS) which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process.
引用
收藏
页码:35 / 40
页数:6
相关论文
共 10 条
[1]  
Androutsopoulos I., 2000, P WORKSH MACH LEARN, P917
[2]  
[Anonymous], 2010, MODSECURITY HDB COMP
[3]  
[Anonymous], 2005, INPROCEEDINGS 20 IEE
[4]  
Ansari S., 2012, International Journal on Computer Science and Engineering, V4, P522
[5]  
Boyd SW, 2004, LECT NOTES COMPUT SC, V3089, P292
[6]  
Denis Kevin, 2014, S SCUR TECHN INF COM
[7]  
Komiya R., 2011, AW SCI TECHN ICAST 0
[8]  
Kruegel C., 2003, 10 ACM C COMP COMM S, P251261
[9]  
Robert C. P., 2006, CHOIX BAYSIEN PRINCI
[10]  
Tajpour A., 2010, 2 INT C ED TECHN COM