SQL Injection Attack Detection Using Fingerprints and Pattern Matching Technique

被引:0
作者
Appiah, Benjamin [1 ]
Opoku-Mensah, Eugene [1 ]
Qin, Zhiguang [1 ,2 ]
机构
[1] UESTC, Sch Informat & Software Engn, Chengdu, Sichuan, Peoples R China
[2] UESTC IMB Technol Ctr, Chengdu, Sichuan, Peoples R China
来源
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017) | 2017年
基金
美国国家科学基金会;
关键词
SQL Injection Attack Detection; Pattern Matching; String Search; SQL Injection;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.
引用
收藏
页码:583 / 587
页数:5
相关论文
共 21 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772
[3]  
Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
[4]  
CLARKE J., 2012, SQL INJECTION ATTACK
[5]  
Coit CJ, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P367, DOI 10.1109/DISCEX.2001.932231
[6]  
Dahse J., 2010, EXPLOITING HARD FILT, V03
[7]   On the evolution of clusters of near-duplicate web pages [J].
Fetterly, D ;
Manasse, M ;
Najork, M .
FIRST LATIN AMERICAN WEB CONGRESS, PROCEEDINGS, 2003, :37-45
[8]  
Fisk M., 2002, LOS ALAMOS NATL LAB
[9]  
Fisk M., 2002, CS20010670 U CAL
[10]  
Huang Qiang, 2011, Journal of Software, V22, P2036, DOI 10.3724/SP.J.1001.2011.03874