pSigene: Webcrawling to Generalize SQL Injection Signatures

ثبت نشده
چکیده

Intrusion detection systems (IDS) are an important component to effectively protect computer systems. Misuse detection is the most popular approach to detect intrusions, using a library of signatures to find attacks. The accuracy of the signatures is paramount for an effective IDS, still today’s practitioners rely on manual techniques to improve and update those signatures. We present a system, called pSigene, for the automatic generation of intrusion signatures by mining the vast amount of public data available on attacks. It follows a fourstep process to generate the signatures, by first crawling attack samples from multiple public cybersecurity web portals. Then, a feature set is created from existing detection signatures to model the samples, which are then grouped using a biclustering algorithm which also gives the distinctive features of each cluster. Finally the system automatically creates a set of signatures using regular expressions, one for each cluster. We tested our architecture for SQL injection attacks and found our signatures to have a True and False Positive Rates of 90.52% and 0.03%, respectively and compared our findings to other SQL injection signature sets from popular IDS and web application firewalls. Results show our system to be very competitive to existing signature sets. Keywords-web application security; signature generalization; biclustering; SQL injection;

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scheduling of Examinations :

To secure today’s computer systems, it is critical to have different intrusion detection sensors (IDS) embedded in them. In spite of that, the complexity of distributed computer systems makes it difficult to determine the appropriate choice and placement of these detectors. For our work, we first describe a method to evaluate the effect a detector configuration has on the accuracy and precision...

متن کامل

The SQL Injection and Signature Evasion

Network firewalls, IPS, and even some dedicated Web application firewall technologies attempt to identify SQL injection via traditional signature-based protections. Signature protections attempt to identify and block SQL injection-related text patterns within Web traffic flows. Unfortunately, real world experience has proven that reliance upon signatures alone is not enough to defeat SQL Inject...

متن کامل

SDriver: Location-specific signatures prevent SQL injection attacks

sql injection attacks involve the construction of application input data that will result in the execution of malicious sql statements. Many web applications are prone to sql injection attacks. This paper proposes a novel method for preventing this kind of attacks by placing a database driver proxy between the application and its underlying relational database management system. To detect an at...

متن کامل

Countering Code Injection Attacks: A Unified Approach

Code injection exploits a software vulnerability through which a malicious user can make an application run unauthorized code. Server applications frequently employ dynamic and domain-specific languages, which are used as vectors for the attack. We propose a generic approach that prevents the class of injection attacks involving these vectors: our scheme detects attacks by using location-specif...

متن کامل

An Approach to Detection of SQL Injection Vulnerabilities Based on Dynamic Query Matching

Web is one of the most popular internet services in today’s world. In today’s world, web servers and web based applications are the popular corporate applications and become the targets of the attackers. A Large number of Web applications, especially those deployed for companies to ebusiness operation involve high reliability, efficiency and confidentiality. Such applications are written in scr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014