Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS
#1


Presented By:
R. Ezumalai, G. Aghila
Department of Computer Science, Pondicherry University


I. INTRODUCTION
Today's modern web era, expects the organization to concentrate more on web application security. This is the major challenge faced by all the organization to protect their precious data against malicious access or corruptions. Generally the program developers show keen interest in developing the application with usability rather than incorporating security policy rules. Input validation issue is a security issue if an attacker finds that an application makes unfounded assumptions about the type, length, format, or range of input data. The attacker can then supply a malicious input that compromises an application. When a network and host level entry points are fully secured; the public interfaces exposed by an application become the only source of attack. The cross site scripting attacks, SQL Injections attacks and Buffer Overflow are the major threat in the web application security through this input validation security issues . Especially SQL Injection attacks breach the database mechanism such as Integration, Authentication, Availability and authorization . Since 2002, nearly 50% of total cyber vulnerabilities were input validation vulnerabilities.
Since 2002, 20% of the input validation issues are SQL Injection vulnerabilities (SQLIVs) and, therefore, 10%o of total cyber vulnerabilities since 2002 . SQL injection attack involves placing SQL statements in the user input for corrupting or accessing the Database . Even the SQL Injection attacks can bypass the security mechanism such as Firewall, cryptography and traditional Intrusion detection systems. If the trend of providing web-based services continues, the prevalence of SQLIVs is likely to increase.
The most worrying aspect of SQL Injection attack are; it is very easy to perform, even if the developers of the application are well known about this type of attacks. The basic idea behind in this attack is that the malicious user counterfeits the data that a web application sends to the database aiming at the modification of the SQL Query that will be executed by the DBMS software. Input validation issues can allow the attackers to gain complete access to such databases. Technologies vulnerable to SQL Injection attacks are dynamic Script languages like ASP, ASP.net, PHP, JSP, CGI, etc. In addition, all types of database have been severely vulnerable in such type of SQL Injection attacks .
Researchers have proposed a different techniques to provide a solution for SQLIAs (SQL Injection attacks), but many of these solutions have limitations that affect their effectiveness and practicality. Researchers have indicated that solution to these types of attacks may be based on defense coding practices. But it's not efficient because of three reasons. First, it is very hard to bring out a rigorous defensive coding discipline. Second, many solutions based on defensive coding address only a subset of the possible attacks. Third, legacy software poses a particularly difficult problem because of the cost and complexity of retrofitting existing code so that it is compliant with defensive coding practices. In this work, an attempt has been made to increase the efficiency of the above techniques by a combinatorial approach for protecting web application against SQL Injection attacks.
The remainder of the paper is organized as follows: Section 2 contains background and related work; Section 3 describes our proposed approach. Section 4 describes the conclusion and future work

read full report
http://ieexplore.ieexpl/freeabs_all.jsp?...er=4809188

and please read related document
http://ethesis.nitrkl.ac1504/1/thesis_to_upload.pdf
http://eurojournalsejsr_38_4_11.pdf
Reply

#2
Combinatorial Approach for Preventing SQL
Injection Attacks


A combinatorial approach for protecting Web applications against SQL injection is discussed in this page. The the attackers get unrestricted access to the database that underlie Web applications. detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server is required from the signature based detection point of view. The analysis of the transaction to find out the malicious code is favourable from Auditing based method standpoint. Hirschberg algorithm is used for the method. This is a approach using divide and conquer to reduce the time and space complexity.

INTRODUCTION
SQL injection attack involves placing SQL statements in the user input for corrupting or accessing the Database. Firewall, cryptography and traditional Intrusion detection can all be easily bypassed by the SQL injection attacks. ASP, ASP.NET, PHP, JSP, CGI and other dynamic script languages are vulnerable to SQL injection attacks. ItIt affects the database without the knowledge of the database administrator. The cross site scripting attacks, SQL Injections attacks and Buffer Overflow are the major threat in the web application security system in terms of input validation security issues. 20 percent of the input validation issues are SQL Injection vulnerabilities (SQLIVS).

defense coding maybe a suggestion but it isn't efficient due to difficulty in bringing about a rigorous defensive coding principle and that only a a subset of the possible attacks can be solved.

Full report PDF is available in this thread:
http://seminarsprojects.net/Thread-combi...cks--12773

ppt is available in this thread:
http://seminarsprojects.net/Thread-preve...r-approach
Reply

#3
COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS

A combinatorial approach for protecting Web applications against SQL injection is discussed in this paper, which is a novel idea of incorporating the uniqueness of Signature based method and auditing method. The major issue of web application security is the SQL Injection, which can give the attackers unrestricted access to the database that underlie Web applications and has become increasingly frequent and serious. From signature based method standpoint of view, it presents a detection mode for SQL injection using pair wise sequence alignment of amino acid code formulated from web application form parameter sent via web server. On the other hand from the Auditing based method standpoint of view, it analyzes the transaction to find out the malicious access. In signature based method It uses an approach called Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. This system was able to stop all of the successful attacks and did not generate any false positives.

Technology to use: JAVA
Reply

#4
I think the ppt in this thread has some details about the algorithm and all:
http://seminarsprojects.net/Thread-preve...r-approach

And in the pdf you posted , the hirscheberg algorithm is given in a bit more mathematical way. Here you can see a simplified form:
http://en.wikipediawiki/Hirschberg%27s_algorithm
Reply

#5
Combinatorial Approach for Preventing SQL Injection Attacks

1 explane the tittle ?

2 what is Combinatorial Approach ?

3 advantages ,disadvatages ?

4 feature work for this paper ?

5 types of attacks ?

6what is signature based meathod ?

7 what is hirschberg algorithm?

8 which books & authors i reffered or websites ?
Reply

#6
to get information about the topic Preventing SQL injection full report ppt and related topic refer the page link bellow

http://seminarsprojects.net/Thread-combi...on-attacks

http://seminarsprojects.net/Thread-preve...r-approach
Reply

#7
Hi,
visit this thread for more details on this topic:
http://seminarsprojects.net/Thread-combi...8#pid22688

the page link to ppt is also posted there
Reply

#8
pls giv the ppt presentation and full report for the project-
AN INTRUSION PREVENTION SYSTEM USING ADVANCED SQL INJECTION BLOCKER- A COMBINATORIAL APPROACH
Reply

#9

I want brief explanation on COMBINATORIAL-APPROACH-FOR-PREVENTING-SQL-INJECTION-ATTACKS
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.