期刊文献+

基于SimHash算法的SQL注入攻击检测方法 被引量:6

SQL injection attack detection method based on Sim Hash
下载PDF
导出
摘要 针对目前SQL注入攻击检测中存在的问题进行研究,提出一种基于SimHash算法的SQL注入检测方法,首先通过自学习过程将每一条SQL语句经过分词、散列、加权、合并,降维生成初始SimHash指纹库,然后基于SimHash利用初始指纹库构建具有索引结构的SimHash指纹库,再结合非黑即白的强白名单策略来判断每条SQL语句的合法性,从而降低黑客绕过防御体系的风险。实验结果表明,该检测方法对于SQL注入攻击具有很好的检测性能,并且具有抵御未知SQL注入攻击的能力,特别适用于中小型网站。 Aiming at vulnerabilities mentioned above,this paper put forward a method to detect SQL injection attack based on SimHash algorithm.Firstly,it generated the initial SimHash fingerprint database after segmenting,hashing,weighting,merging,and dimension-reducing each SQL statement through self-learning process.Secondly,it used the initial fingerprint database to build the SimHash fingerprint database with index structure.Thirdly,it judged the legitimacy of each SQL statement by combining strict white list strategy which took"users’action is either black or white"as its core concept with the SimHash fingerprint database.Thereby,it lowered the risk of hacker’s attacks bypassing the defense system.Experiments show that the detection method has a favorable performance of defensing SQL injection attack,including defensing some unknown ones,which is especially applicable for medium and small-sized websites.
作者 孔德广 蒋朝惠 郭春 Kong Deguang;Jiang Chaohui;Guo Chun(College of Computer Science&Technology,Guizhou University,Guiyang 550025,China;Guizhou Provincial Key Laboratory of Public Big Data,Guiyang 550025,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第7期2117-2122,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61540049) 贵州省基础研究重大项目(黔科合JZ字[2014]2001-21) 贵州省科技合作计划项目(黔科合重大专项字[2018]3001,黔科合基础[2017]1051,黔科合基础[2016]1052) 2017贵州省公共大数据重点实验室开放课题(2017BDKFJJ025) 河南省科技攻关计划项目(182102210123)。
关键词 SQL注入 SimHash 白名单 防御体系 SQL injection SimHash white list defense system
  • 相关文献

参考文献6

二级参考文献56

  • 1周权,肖德琴,唐屹.基于Linux和IPSec的VPN安全网关设计与实现[J].计算机应用研究,2005,22(9):229-231. 被引量:7
  • 2Clarke J.SQL注入攻击与防御[M].黄晓磊,李化,译.北京:清华大学出版社,2010.
  • 3王苏南.高速复杂网络环境下异常流量检测技术研究[D].解放军信息工程大学,2012.
  • 4CLARKE J,黄晓磊,李化译.SQL注入攻击与防御[M].清华大学出版社,2010.
  • 5OWASP 2013 top 10 risks[EB/OL], https://www.owasp.org/index.php/ Top 10_2013-Top_l 0, 2015-3-12.
  • 6MCDONALD, S. SQL Injection: modes of attack, defense, andwhy it matters[EB/OL], http://www.governmentsecurity.org/articles/ SQLInjectionModesofAttackDefence and Why It Matters. php, 2015-3-11.
  • 7ORSO A, HALFOND W G J, VIEGAS J. A classification of SQL injection attacks and countermeasures[C]//The International Sympo- sium on Secure Software Engineering. c2006.
  • 8APPELT D, NGUYEN D C, BRIAND L. Behind an application fire- wall, are we safe from SQL injection attacks[C]//IEEE International Conference on Sofiware Testing, Verification and Validation (ICST). c2015:1-10.
  • 9HALFOND W G J, ORSO A. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks[C]//20th IEEE/ACM International Conference on Automated Software Engineering. ACM, c2005: 174-183.
  • 10HALFOND W G J, ORSO A. Detection and prevention of SQL injec- tion attacks[J]. Malware Detection, 2006, (27): 85-109.

共引文献33

同被引文献50

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部