Inscrição na biblioteca: Guest
Journal of Automation and Information Sciences

Publicou 12 edições por ano

ISSN Imprimir: 1064-2315

ISSN On-line: 2163-9337

SJR: 0.173 SNIP: 0.588 CiteScore™:: 2

Indexed in

Automatic Vulnerability Detection Algorithm for the SQL-Injection

Volume 51, Edição 7, 2019, pp. 47-54
DOI: 10.1615/JAutomatInfScien.v51.i7.40
Get accessGet access

RESUMO

Attacks to web applications are a relatively new type of attack. If the web application does not filter incoming parameters properly, then attackers can get the opportunity to falsify the database using the form on the web page or by changing other incoming data. Mathematical modeling and identification of information objects play an important role in solving problems of pattern recognition. One of these tasks is to detect attacks or normal requests for web applications. Studies on the detection of attacks or normal requests for web applications began relatively recently. Nevertheless, there is a lot of research in this direction. Attack of the SQL-injection is a common way of hacking web applications that have a database. Our paper proposes a mathematical method for identifying SQL-injection attacks using a function bounded below that depends on the input string. To build such function, we used special characters and key words that are often found in the construction of attacks by intruders. In our proposed method, we can detect SQL-injection attacks using a single character. Nevertheless, we experimentally have shown that the proposed detection method using a set of numerous symbols allows us to determine the vulnerability of the SQL-injection type more accurately. In the proposed method, we created a character set that combines both attack and normal detections, and the previously known threshold, using the approximate data of the attackers and normal strings. According to experiments with artificial data, the set contains a space, semicolon and right bracket that are most suitable for detecting an attack or normal request.

Referências
  1. KerimovK.F., Model for identifying vulnerabilities to information security in electronic resources, Perspektivy razvitiya tekhniki i tekhnologii i dostizheniya gorno-metallurgicheskoy otrasli za gody nezavisimosti Respubliki Uzbekistan: Tezisy dokladov Respublikanskoy nauchnoy konferentsii, May 12-14, Navoi, 2011, 339-340. .

  2. KozlovD.D., Petukhov A.A., Methods for detecting vulnerabilities in web applications, Programmnyye sistemy i instrumenty, 2006, No. 7, 156-166. .

  3. RyabkoD.M., An approach to testing the vulnerability of web applications from SQL-injection attacks, Problemy programmirovaniya, 2006, No. 2-3, 585-591. .

  4. KerimovK.F., Mukhsinov Sh.Sh., Ismatullaev S.O., Database firewall based on anomaly detection, Problemy informatiki i energetiki, 2016. No. 1, 89-95. .

  5. Opanasenko V.N., Kryvyi S.L., Synthesis of adaptive logical networks on the basis of Zhegalkin polynomials, Cybernetics and Systems Analysis, 2015, 51, No. 6, 969-977, DOI: 10.1007/sl0559-015-9790-1. .

Portal Digital Begell Biblioteca digital da Begell eBooks Diários Referências e Anais Coleções de pesquisa Políticas de preços e assinaturas Begell House Contato Language English 中文 Русский Português German French Spain