Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2345396.2345495acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

Protecting web applications from SQL injection attacks by using framework and database firewall

Published: 03 August 2012 Publication History

Abstract

SQL Injection attacks are the costly and critical attacks on web applications: it is a code injection technique that allows attackers to obtain unrestricted access to the databases and potentially sensitive information like usernames, passwords, email ids, credit card details present in them. Various techniques have been proposed to address the problem of SQL Injection attack such as defense coding practices, detection and prevention techniques, and intrusion detection systems. However most of these techniques have one or more disadvantages such as requirement for code modification, applicable to limited type of attacks and web applications. In this paper, we discuss a secure mechanism for protecting web applications from SQL Injection attacks by using framework and database firewall. This mechanism uses combined static and dynamic analysis technique. In static analysis, we list URLs, forms, injection points, and vulnerable parameters of web application. Thus, we identify valid queries that could be generated by the application. In dynamic analysis, we use database firewall to monitor runtime generated queries and check them against the whitelist of queries. The experimental setup makes use of real web applications and two open source tools namely Web Application Attack and Audit Framework (w3af) and GreenSQL. We used w3af for listing all the valid queries and GreenSQL as database firewall. The results show that implemented mechanism is capable of detecting all types of SQL Injection attacks without requiring any code modification to the existing web application but with an additional element of deploying a proxy.

References

[1]
The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org.
[2]
Symantec Corp., "Web Based Attacks," Feb. 2009, http://eval.symantec.com/mktginfo/enterprise/white_papers/b whitepaper_web_based_attacks_03--2009.en-us.pdf.
[3]
W. G. J. Halfond, J. Viegas, and A. Orso, "A Classification of SQL-Injection Attacks and Countermeasures," in Proceedings of the IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA, 2006, pp. 65--81.
[4]
apache-scalp, Apache log analyzer for security, http://code.google.com/p/apache-scalp.
[5]
Snort, open source network intrusion prevention and detection system (IDS/IPS), http://www.snort.org/.
[6]
"GreenSQL, an Open Source database firewall used to protect databases from SQL injection attacks", http://www.greensql.net.
[7]
J. Fonseca, M. Vieira and H. Madeira, "Detecting Malicious SQL", Int. Conference on Trust, Privacy & Security in Digital Business, Sep. 2007.
[8]
Elia, I. A.; Fonseca, J.; Vieira, M.;, "Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study," IEEE 21st International Symposium on Software Reliability Engineering (ISSRE-2010), pp. 289--298, 1--4 Nov. 2010
[9]
"w3af is a Web Application Attack and Audit Framework", http://w3af.sourceforge.net/.
[10]
Konstantinos Kemalis and Theodores Tzouramanis. 2008. SQL-IDS: a specification-based approach for SQL injection detection. In proceedings of the 2008 ACM symposium on Applied computing (SAC'08). ACM, New York, NY, USA, 2153--2158. DOI=http://doi.acm.org/10.1145/1363686.1364201.
[11]
K. Jeom-Goo, "Injection Attack Detection Using the Removal of SQL Query Attribute Values," in International Conference on Information Science and Applications (ICISA-2011), 2011, pp. 1--7.
[12]
William G. J. Halfond and Alessandro Orso. 2005. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering (ASE '05). ACM, New York, NY, USA, 174--183. DOI=http://doi.acm.org/10.1145/1101908.1101935.
[13]
"Apache-JMeter static and dynamic resources performance" measurement tool, http://jmeter.apache.org/.

Cited By

View all
  • (2022)Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniquesJournal of Big Data10.1186/s40537-022-00678-09:1Online publication date: 30-Dec-2022
  • (2022)Detection of SQL Injection Attack Using Adaptive Deep Forest2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)10.1109/IC3IOT53935.2022.9767878(1-6)Online publication date: 10-Mar-2022
  • (2021)Penetration Frameworks and Development Issues in Secure Mobile Application Development: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2021.30882299(87806-87825)Online publication date: 2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
August 2012
1307 pages
ISBN:9781450311960
DOI:10.1145/2345396
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ISCA: International Society for Computers and Their Applications
  • RPS: Research Publishing Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SQL injection attacks
  2. database firewall
  3. dynamic analysis
  4. static analysis
  5. web application

Qualifiers

  • Research-article

Conference

ICACCI '12
Sponsor:
  • ISCA
  • RPS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniquesJournal of Big Data10.1186/s40537-022-00678-09:1Online publication date: 30-Dec-2022
  • (2022)Detection of SQL Injection Attack Using Adaptive Deep Forest2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)10.1109/IC3IOT53935.2022.9767878(1-6)Online publication date: 10-Mar-2022
  • (2021)Penetration Frameworks and Development Issues in Secure Mobile Application Development: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2021.30882299(87806-87825)Online publication date: 2021
  • (2016)Web Uygulama Güvenliği Açıklıkları Ve Güvenlik Çözümleri Üzerine Bir AraştırmaULUSLARARASI BİLGİ GÜVENLİĞİ MÜHENDİSLİĞİ DERGİSİ10.18640/ubgmd.568362:1Online publication date: 30-Jun-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media