A Structured Analysis of SQL Injection Runtime Mitigation Techniques
نویسندگان
چکیده
SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques has been conducted with the primary resulting solution requiring developers to code defensively. Although, defensive coding is a valid solution, the current market demand for websites is being filled by inexperienced developers with little knowledge of secure development practices. Unlike the successful case of ASLR, no SQLIA runtime mitigation technique has moved from research to enterprise use. This paper presents an in-depth analysis and classification, based on Formal Concept Analysis, of the 10 major SQLIA runtime mitigation techniques. Based on this analysis, one technique was identified that shows the greatest potential for transition to enterprise use. This analysis also serves as an enhanced SQLIA mitigation classification system. Future work includes plans to move the selected SQLIA runtime mitigation technique closer to enterprise use.
منابع مشابه
Testing for Tautology based SQL Injection Attack using Runtime Monitors
Today, all commercial and business applications (ecommerce, banking, blogs, web mail, etc.,) are built as webbased database applications. Increasing prominence and usage of these applications has made them more susceptible to attacks because they store huge amount of sensitive user information. Traditional security mechanisms like network firewalls, intrusion detection systems, and use of encry...
متن کاملRuntime Monitoring – A Post-deployment Security Testing Technique
Abstract-Increased usage of software systems in recent years has in turn led to high need for ensuring the (i) confidentiality, (ii) integrity, and (iii) availability of these software systems. Pre-deployment security testing techniques do not ensure that all possible behaviors of implementation are analyzed, executed and tested. This in turn causes the software to often behave differently than...
متن کاملSQLPrevent: Effective dynamic detection and prevention of SQL injection
This paper presents an approach for retrofitting existing web applications with run-time protection against known as well as unseen SQL injection attacks (SQLIAs). This approach (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not require modification of the runtime envi...
متن کاملSQLPrevent: Effective Dynamic Detection and Prevention of SQL Injection Attacks Without Access to the Application Source Code
This paper presents an effective approach for detecting and preventing known as well as novel SQL injection attacks. Unlike existing approaches, ours (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not need training traces, (4) does not require modification of the runti...
متن کاملDetection and mitigation of Web Services Attacks using Markov Model
We introduce Markov Model for Web services attacks detection and mitigation. This model is capable of preventing not only injection attacks like SQL injection, Cross-Site Scripting (XSS), buffer overflow but also detect abnormal Web service client behavior. We adopted the well known technique based on Markov model for detecting Web application attacks. Our system contains two Markov models. Fir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017