메뉴 건너뛰기




Volumn 55, Issue 1-2, 2012, Pages 58-68

A novel method for SQL injection attack detection based on removing SQL query attribute values

Author keywords

A combined dynamic and static method; DBMS; SQL injection attack; SQL query; Web application

Indexed keywords

ATTACK DETECTION; ATTRIBUTE VALUES; CODE INJECTION; DATABASE LAYER; DETECTION METHODS; DYNAMIC CONTENT; SECURITY VULNERABILITIES; SQL INJECTION; SQL QUERY; STATIC AND DYNAMIC ANALYSIS; STATIC METHOD; WEB APPLICATION;

EID: 82755194883     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.01.050     Document Type: Article
Times cited : (109)

References (30)
  • 1
    • 82755168037 scopus 로고    scopus 로고
    • The Open Web Application Security Project, OWASP TOP 10 Project.
    • The Open Web Application Security Project, OWASP TOP 10 Project. http://www.owasp.org/.
  • 2
    • 82755168035 scopus 로고    scopus 로고
    • Apache Struts Project, Struts.
    • Apache Struts Project, Struts. http://struts.apache.org/.
  • 3
    • 82755194351 scopus 로고    scopus 로고
    • PHP, magic quotes.
    • PHP, magic quotes. http://www.php.net/magic_quotes/.
  • 4
    • 4544287108 scopus 로고    scopus 로고
    • JDBC checker: a static analysis tool for SQL/JDBC applications, in: Proceedings of the 26th International Conference on Software Engineering, ICSE, 2004, pp. 697-698.
    • C. Gould, Z. Su, P. Devanbu, JDBC checker: a static analysis tool for SQL/JDBC applications, in: Proceedings of the 26th International Conference on Software Engineering, ICSE, 2004, pp. 697-698.
    • Gould, C.1    Su, Z.2    Devanbu, P.3
  • 5
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection, in: Proceedings of the 12th International World Wide Web Conference ACM, 2004, pp. 40-52.
    • Y. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, S.Y. Kuo, Securing web application code by static analysis and runtime protection, in: Proceedings of the 12th International World Wide Web Conference ACM, 2004, pp. 40-52.
    • Huang, Y.1    Yu, F.2    Hang, C.3    Tsai, C.H.4    Lee, D.T.5    Kuo, S.Y.6
  • 6
    • 82755178036 scopus 로고    scopus 로고
    • Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium
    • V.B. Livshits, M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium, 2005, pp. 271-286.
    • (2005) , pp. 271-286
    • Livshits, V.B.1    Lam, M.S.2
  • 8
    • 33745201748 scopus 로고    scopus 로고
    • An analysis framework for security in web applications, in: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, SAVCBS
    • G. Wassermann, Z. Su, An analysis framework for security in web applications, in: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, SAVCBS, 2004, pp. 70-78.
    • (2004) , pp. 70-78
    • Wassermann, G.1    Su, Z.2
  • 9
    • 48649100112 scopus 로고    scopus 로고
    • Sania: syntactic and semantic analysis for automated testing against SQL injection, in: Proceedings of the Computer Security Applications Conference 2007
    • Y. Kosuga, K. Kernel, M. Hanaoka, M. Hishiyama, Y. Takahama, Sania: syntactic and semantic analysis for automated testing against SQL injection, in: Proceedings of the Computer Security Applications Conference 2007, 2007, pp. 107-117.
    • (2007) , pp. 107-117
    • Kosuga, Y.1    Kernel, K.2    Hanaoka, M.3    Hishiyama, M.4    Takahama, Y.5
  • 10
    • 82755168036 scopus 로고    scopus 로고
    • Paros. Parosproxy.org.
    • Paros. Parosproxy.org. http://www.parosproxy.org/.
  • 11
    • 82755195338 scopus 로고    scopus 로고
    • Improving the identification of actual input manipulation vulnerabilities, in: 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM
    • Y. Shin, Improving the identification of actual input manipulation vulnerabilities, in: 14th ACM SIGSOFT Symposium on Foundations of Software Engineering ACM, 2006.
    • (2006)
    • Shin, Y.1
  • 12
    • 77953855187 scopus 로고    scopus 로고
    • Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceedings of the 5th International Workshop on Software Engineering and Middleware
    • G. Buehrer, B.W. Weide, P.A. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceedings of the 5th International Workshop on Software Engineering and Middleware, 2005, pp. 105-113.
    • (2005) , pp. 105-113
    • Buehrer, G.1    Weide, B.W.2    Sivilotti, P.A.3
  • 13
    • 77953855187 scopus 로고    scopus 로고
    • Using parse tree validation to prevent SQL injection attacks, in: Proceeding of the 5th International Workshop on Software Engineering and Middleware ACM
    • G. Buehrer, B.W. Weide, P.A.G. Sivilotti, Using parse tree validation to prevent SQL injection attacks, in: Proceeding of the 5th International Workshop on Software Engineering and Middleware ACM, 2005, pp. 106-113.
    • (2005) , pp. 106-113
    • Buehrer, G.1    Weide, B.W.2    Sivilotti, P.A.G.3
  • 14
    • 77952407110 scopus 로고    scopus 로고
    • AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks, in: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering
    • W.G. Halfond, A. Orso, AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks, in: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, 2005, pp. 174-183.
    • (2005) , pp. 174-183
    • Halfond, W.G.1    Orso, A.2
  • 15
    • 33745811685 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • in: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
    • Z. Su, G. Wassermann, The essence of command injection attacks in web applications, in: Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006, pp. 372-382.
    • (2006) , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 16
    • 79960266079 scopus 로고    scopus 로고
    • Preventing SQL injection attacks in stored procedures
    • in: Software Engineering Conference. Australian, 2006,
    • K. Wei, M. Muthuprasanna, S. Kothari, Preventing SQL injection attacks in stored procedures, in: Software Engineering Conference 2006. Australian, 2006, pp. 18-21.
    • (2006) , pp. 18-21
    • Wei, K.1    Muthuprasanna, M.2    Kothari, S.3
  • 17
    • 84880450431 scopus 로고    scopus 로고
    • Web application security assessment by fault injection and behavior monitoring
    • in: Proceedings of the 12th International Conference on World Wide Web
    • Y. Huang, S. Huang, T. Lin, C. Tasi, Web application security assessment by fault injection and behavior monitoring, in: Proceedings of the 12th International Conference on World Wide Web, 2003, pp. 148-159.
    • (2003) , pp. 148-159
    • Huang, Y.1    Huang, S.2    Lin, T.3    Tasi, C.4
  • 18
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • in: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment
    • F. Valeur, D. Mutz, G. Vigna, A learning-based approach to the detection of SQL attacks, in: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2005, pp 123-140.
    • (2005) , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3
  • 20
    • 35048851186 scopus 로고    scopus 로고
    • SQLrand: preventing SQL injection attacks
    • Applied Cryptography and Network Security
    • Boyd S., Keromytis A. SQLrand: preventing SQL injection attacks. LNCS 2004, vol. 3089:292-302.
    • (2004) LNCS , vol.3089 , pp. 292-302
    • Boyd, S.1    Keromytis, A.2
  • 21
    • 38049147942 scopus 로고    scopus 로고
    • SQL injection attack detection: profiling of web application parameter using the sequence pairwise alignment
    • Information Security Applications
    • Park J., Noh B. SQL injection attack detection: profiling of web application parameter using the sequence pairwise alignment. LNCS 2007, vol. 4298:74-82.
    • (2007) LNCS , vol.4298 , pp. 74-82
    • Park, J.1    Noh, B.2
  • 22
    • 82755168033 scopus 로고    scopus 로고
    • GotoCode.
    • GotoCode. http://www.gotocode.com/.
  • 23
    • 34547241372 scopus 로고    scopus 로고
    • A classification of SQL-injection attacks and countermeasures
    • in: Proceeding on International Symposium on Secure Software Engineering, Raleigh, NC, USA
    • W.G. Halfond, J. Viegas, A. Orso, A classification of SQL-injection attacks and countermeasures, in: Proceeding on International Symposium on Secure Software Engineering, Raleigh, NC, USA, 2006, pp. 65-81.
    • (2006) , pp. 65-81
    • Halfond, W.G.1    Viegas, J.2    Orso, A.3
  • 24
    • 33745661661 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • Proceeding of Recent Advances in Intrusion Detection
    • Pietraszek T.C., Berghe V. Defending against injection attacks through context-sensitive string evaluation. LNCS 2006, vol. 3858:124-145.
    • (2006) LNCS , vol.3858 , pp. 124-145
    • Pietraszek, T.C.1    Berghe, V.2
  • 25
    • 33846310068 scopus 로고    scopus 로고
    • Franz
    • in: Proceedings 21st Annual Computer Security Applications Conference
    • V. Haldar, D. Chandra, Franz, Dynamic Taint propagation for Java, in: Proceedings 21st Annual Computer Security Applications Conference, 2005, pp. 303-311.
    • (2005) Dynamic Taint propagation for Java , pp. 303-311
    • Haldar, V.1    Chandra, D.2
  • 26
    • 84871349041 scopus 로고    scopus 로고
    • Automatically hardening web application using precise tainting information
    • Twentieth IFIP Iternational Information Security Conference
    • Nguyen-Tuong A., Guarnieri S., Greene D., Shirley J., Evans D. Automatically hardening web application using precise tainting information. LNCS 2005, vol. 181:295-307.
    • (2005) LNCS , vol.181 , pp. 295-307
    • Nguyen-Tuong, A.1    Guarnieri, S.2    Greene, D.3    Shirley, J.4    Evans, D.5
  • 27
    • 31344435513 scopus 로고    scopus 로고
    • Safe query objects
    • in: Proceedings of the 27th International Conference on Software Engineering
    • W.R. Cook, S. Rai, Safe query objects: statically typed objects as remotely executable queries, in: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 97-106.
    • (2005) statically typed objects as remotely executable queries , pp. 97-106
    • Cook, W.R.1    Rai, S.2
  • 28
    • 77953069969 scopus 로고    scopus 로고
    • Abstracting application-level web security
    • in: Proceedings of the 11th International Conference on the World Wide Web
    • D. Scott, R. Sharp, Abstracting application-level web security, in: Proceedings of the 11th International Conference on the World Wide Web, 2002, pp. 396-407.
    • (2002) , pp. 396-407
    • Scott, D.1    Sharp, R.2
  • 29
    • 31744432699 scopus 로고    scopus 로고
    • Finding application errors and security flaws using PQL
    • in: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications
    • M. Martin, B. Livshits, M.S. Lam, Finding application errors and security flaws using PQL: a program query language, in: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, 2005, pp. 365-383.
    • (2005) A program query language , pp. 365-383
    • Martin, M.1    Livshits, B.2    Lam, M.S.3
  • 30
    • 33244471315 scopus 로고    scopus 로고
    • SQL DOM
    • in: Proceedings of the 27th International Conference on Software Engineering
    • R. McClure, I. Krüger, SQL DOM: compile time checking of dynamic SQL statements, in: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 88-96.
    • (2005) compile time checking of dynamic SQL statements , pp. 88-96
    • McClure, R.1    Krüger, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.