期刊文献+

面向用户意图的SQL注入检测方法 被引量:1

The Intention-Oriented SQL Injection Defense
下载PDF
导出
摘要 Web程序安全的首要威胁是SQL注入攻击,动态分析技术可有效防御此类攻击.提出面向用户意图的检测方法,在程序发布前预先定义Web程序期望的所有数据库操作,在运行时拦截提交至数据库的操作,阻止不符合意图的操作.设计并实现描述数据库操作意图的语言SQLIDL,将开发者提供的允许操作集合解释为以确定有限自动机(DFA)表示的字符串集合,并支持表名、列名、列值及存储过程名的正则表示.在Securi Bench测试集的实验表明,该方法可有效检测现有SQL攻击模式且运行开销较小. SQL injection attack( SQLIA) is the most serious threat to Web program security,while dynamic analysis may effectively defend SQLIA. An intention-oriented detection approach is proposed to represent all the database operations expected by Web users,to intecept the operations before the user submission and drop the unintentional operations. A language named SQLIDL is proposed to express the intention of database operations,to transform the SQL operations into string sets formalized by deterministic finite automata( DFA). SQLIDL currently implements the regular expression representation of table names,column names,values and store procedure names. The prototype implementation is evaluated on Securi Bench datasets and the results demonstrate all existing SQL attack patterns can be correctly detected with acceptable run-time overhead.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2016年第4期386-391,共6页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 国家自然科学基金(61562040) 江西师范大学科研计划(7177)资助项目
关键词 SQL注入 动态分析 有限自动机 攻击模式 SQL injection dynamic analysis DFA attack pattern
  • 相关文献

参考文献14

  • 1OWASP Topl0-Open Web Application Security Project. Top ten Web application security risks [ EB/OL]. [2015- 03-14]. http://www, owasp, org. cn/owasp-project/ 2013top10.
  • 2Wasserman G,Su Zhendong. Sound and precise analysis of Web applications for injection vulnerabilities [ EB/OL]. [2015-03-14J. http://web, cs. ucdavis, edu/~ su/publi- cations/pldi07, pdf.
  • 3Jovanovic N, Kruegel C, Kirda E. Static analysis for detec- ting taint-style vulnerabilities in web applications [ J ]. Journal of Computer Security,2010,15 (5) :861-907.
  • 4黄强,曾庆凯.基于信息流策略的污点传播分析及动态验证[J].软件学报,2011,22(9):2036-2048. 被引量:21
  • 5Ray D, Ligatti J. Defining code-injection attacks [ J]. Acre Sigplan Notices ,2015,47 ( 1 ) :179-190.
  • 6Tuong N, Guarnieri A, Greene S, et al. Automatically hard- ening web applications using precise tainting [ J ]. Ifip Ad- vances in Information & Communication Technology, 2010,181:372-382.
  • 7王溢,李舟军,郭涛.防御代码注入式攻击的字面值污染方法[J].计算机研究与发展,2012,49(11):2414-2423. 被引量:18
  • 8Son S, McKinley K S, Shmatikov V. Diglossia: detecting code injection attacks with precision and efficiency [ EB/ OL]. [ 2015-02-17 ]. http://msr-waypoint, corn/pubs/ 202166/diglossia-ccs-2013. pdf.
  • 9Bandhakavi S, Bisht P, Madhusudan P. CANDID:preven- ting SQL injection attacks using dynamic candidate evalu- ations [ EB/OL]. [2015-02-17]. https://www, cs. uic. edu/- pbisht/files/candid-sql-injection-ccs07, pdf.
  • 10Su Zhendong, Wassermann G. The essence of command in- jection attacks in Web applications [ J]. Acre Sigplan No- tices ,2006 ,41 ( 1 ) :372-382.

二级参考文献47

  • 1Vcnkataramani G, Doudalis I, Solihin Y, Prvulovic M. FlexiTaint: A programmable accelerator for dynamic taint propagation. In: Carter J, ed. Proc. of the 14th Int'l Syrup. on High Performance Computer Architecture (HPCA). New York: ACM Press, 2008. 173-184. Idol: 10.1109/HPCA.2008.46S8637].
  • 2Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Harder E, ed. Prec. of the Network and Distributed System Security Syrup. (NDSS 2005). San Diego: National Security Agency Press, 2005. 187-204.
  • 3CVE terminology page. 2009. http://www.cve.mitre.org/about/terminology.html#vulnerability.
  • 4Sekar R. An efficient black-box technique for defeating Web application attacks. In: Vigna G, ed. Proc. of the Network and Distributed System Security Syrup. (NDSS 2009). San Diego: National Security Agency Press, 2009.23-39.
  • 5CVE and CCE statistics query page. 2009. http://web.nvd.nist.gov/view/vuln/statistics?execution=e 1 s 1.
  • 6Open Web Application Security Project (OWASP). The ten most critical Web application security vulnerabilities. 2007. http://www.owasp.org/images/e/e8/OWASP_ Top_ 10 _2007.pdf.
  • 7Lam MS, Martin MC, Livshits VB, Whaley J. Securing Web applications with static and dynamic information flow tracking. In: Hatcliff J, ed. Proc. of the 2008 ACM SIGPLAN Symp. on Partial Evaluation and Semantics-based Program Manipulation. New York: ACM Press, 2008.3-12. [doi: 10.1145/1328408.1328410].
  • 8Xie YC, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. In: Paakki J, ed. Proc. of the 9th European Software Engineering Conf. Held Jointly with 1 lth ACM SIGSOFT Int'l Symp. on Foundations of Software Engineering. New York: ACM Press, 2003. 327-336. [doi: 10.1145/940071.940115].
  • 9Yin H, Song D, Egele M, Kruegel C, Kirda E. Panorama: Capturing system-wide information flow for malware detection and analysis. In: Ning P, ed. Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 116-127. [doi: 10.1145/1315245.1315261].
  • 10Sabelfeld A, Myers AC. Language-Based information-flow security. IEEE Journal on Selected Areas in Communications, 2003, 21(1):5-19. [doi: 10.1109/JSAC.2002.806121].

共引文献36

同被引文献5

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部