A Structured Analysis of SQL Injection Runtime Mitigation Techniques

نویسندگان

  • Stuart Steiner
  • Daniel Conte de Leon
  • Jim Alves-Foss
چکیده

SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques has been conducted with the primary resulting solution requiring developers to code defensively. Although, defensive coding is a valid solution, the current market demand for websites is being filled by inexperienced developers with little knowledge of secure development practices. Unlike the successful case of ASLR, no SQLIA runtime mitigation technique has moved from research to enterprise use. This paper presents an in-depth analysis and classification, based on Formal Concept Analysis, of the 10 major SQLIA runtime mitigation techniques. Based on this analysis, one technique was identified that shows the greatest potential for transition to enterprise use. This analysis also serves as an enhanced SQLIA mitigation classification system. Future work includes plans to move the selected SQLIA runtime mitigation technique closer to enterprise use.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Testing for Tautology based SQL Injection Attack using Runtime Monitors

Today, all commercial and business applications (ecommerce, banking, blogs, web mail, etc.,) are built as webbased database applications. Increasing prominence and usage of these applications has made them more susceptible to attacks because they store huge amount of sensitive user information. Traditional security mechanisms like network firewalls, intrusion detection systems, and use of encry...

متن کامل

Runtime Monitoring – A Post-deployment Security Testing Technique

Abstract-Increased usage of software systems in recent years has in turn led to high need for ensuring the (i) confidentiality, (ii) integrity, and (iii) availability of these software systems. Pre-deployment security testing techniques do not ensure that all possible behaviors of implementation are analyzed, executed and tested. This in turn causes the software to often behave differently than...

متن کامل

SQLPrevent: Effective dynamic detection and prevention of SQL injection

This paper presents an approach for retrofitting existing web applications with run-time protection against known as well as unseen SQL injection attacks (SQLIAs). This approach (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not require modification of the runtime envi...

متن کامل

SQLPrevent: Effective Dynamic Detection and Prevention of SQL Injection Attacks Without Access to the Application Source Code

This paper presents an effective approach for detecting and preventing known as well as novel SQL injection attacks. Unlike existing approaches, ours (1) is resistant to evasion techniques, such as hexadecimal encoding or inline comment, (2) does not require analysis or modification of the application source code, (3) does not need training traces, (4) does not require modification of the runti...

متن کامل

Detection and mitigation of Web Services Attacks using Markov Model

We introduce Markov Model for Web services attacks detection and mitigation. This model is capable of preventing not only injection attacks like SQL injection, Cross-Site Scripting (XSS), buffer overflow but also detect abnormal Web service client behavior. We adopted the well known technique based on Markov model for detecting Web application attacks. Our system contains two Markov models. Fir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017