.

Friday, March 1, 2019

An Approach to Detect and Prevent Sql Injection Attacks in Database Using Web Service

IJCSNS International daybook of physical bodyr Science and mesh tribute, VOL. 11 no. 1, January 2011 197 An Approach to get word and Pr regular(a)t SQL stab Attacks in Database exploitation Web help IndraniBalasundaram 1 Dr. E. Ramaraj2 1 Lecturer, Department of computing device Science, Madurai Kamaraj University, Madurai 2 Director of calculator sum of m stary Alagappa University, Karaikudi. Abstract SQL interfereion is an gust methodology that targets the selective information residing in a infobase done with(predicate) the firew wholly that shields it. The flack catcher takes advantage of poor foreplay administration in rule and ebsite administration. SQL shooter Attacks occur when an assailant is able to insert a series of SQL statements in to a doubt by manipulating exploiter stimulant drug selective information in to a entanglement- found operation, attacker rear supplant take advantages of net action programming security flaws and pass unex pected catty SQL statements through a web operation for execution by the backend database. This paper counsels a novel specification-based methodology for the vetoion of SQL injection Attacks. The both(prenominal) near grievous advantages of the spic-and-span approaching against xisting analogous mechanisms atomic n drinking chocolate 18 that, first, it prevents all forms of SQL injection attacks second, online technique does not al imprint the exploiter to b separate database right off in database waiter. The innovative technique Web profit orientated XPATH Au sotication proficiency is to find out and prevent SQLInjection Attacks in database the deployment of this technique is by generating functions of two filtration models that argon dissembleive follow and Service Detector of masking scripts additionally allowing unseamed integration with currently-deployed transcriptions. General TermsLanguages, Security, Verification, Experimentation. Keywords D atabase security, world-wide web, web exertion security, SQL injection attacks, Run fourth dimension Monitoring changes to data. The affright of SQL injection attacks has become increasingly frequent and serious. . SQL-Injection Attacks atomic number 18 a mark of attacks that m any of these systems ar highly vulnerable to, and on that exhibit is no cognize fool-proof substantiate against such(prenominal) attacks. Comp read-only storageise of these web applications represents a serious brat to organizations that have deployed them, and also to substance absubstance ab drug users who trust these systems to store hidden data. The Web applications hat are vulnerable to SQL-Injection attacks user introduces the attackers embeds overlooks and gets executed 4. The attackers directly door the database underlying an application and leak or transform confidential in coiffureion and execute malicious compute 12. In most cases, attackers even use an SQL Injection exposure to take control and corrupt the system that hosts the Web application. The increasing number of web applications falling prey to these attacks is alarmingly high 3 obstruction of SQLIAs is a major challenge. It is difficult to pass and enforce a rigorous defensive tag discipline. Many olutions based on defensive coding address only a subset of the attainable attacks. Evaluation of Web Service Oriented XPATH Au sotication technique has no inscribe adaption as swell as automation of detective work and prevention of SQL Injection Attacks. Recent U. S. indus deform regulations such as the Sarbanes-Oxley Act 5 pertaining to information security, try to enforce strict security compliance by application vendors. 1. Introduction 1. 1 SAMPLE APPLICATION Information is the virtually important business asset in todays surround and achieving an appropriate take aim of Information Security. SQL-Injection Attacks (SQLIAs) re one of the topmost threats for web application security. For m odelling financial fraud, theft confidential data, deface website, sabotage, espionage and cyber terrorism. The valuation process of security tools for detection and prevention of SQLIAs. To pass security guidelines inside or outside the database it is recommended to access the handsome databases should be superviseed. It is a hacking technique in which the attacker adds SQL statements through a web applications arousal palm or hidden parameters to gain access to resources or make applications programme that contain SQL Injection exposure.The example refers to a fairly simple vulnerability that could be prevented exploitation a straightforward coding fix. This example is hardly apply for illustrative purposes because it is easy to understand and general enough to deck many un desire types of attacks. The code in the example uses the introduce parameters LoginID, news to energetically build an SQL call into question and submit it to a database. For example, if a user s ubmits loginID and password as secret, and 123, the application dynamically builds and submits the examination Manuscript trustworthy January 5, 2011 Manuscript revised January 20, 2011 198IJCSNS International ledger of Computer Science and meshwork Security, VOL. 11 No. 1, January 2011 pick out * from FROM loginID=secret AND pass1=123 user_info WHERE If the loginID and password be the check entry in the database, it pass on be redirect to user_main. aspx page other wise it result be redirect to error. aspx page. 1. dim loginId, countersignature as string along 2. loginId = Text1. Text 3. password = Text2. Text 3. cn. open() 4. qry=select * from user_info where LoginID= & loginID & and pass1= & password & 5. cmd=new sqlcommand(qry,cn) 6. rd=cmd. executereader() 7. if (rd. Read=True) Then 8. Response. redirect(user_main. spx) 9. else 10. Response. redirect(error. aspx) 11. end if 12. cn. close() 13. cmd. dispose() b. Union Query In substance-query attacks, Attackers do this by injecting a statement of the form UNION contract because the attackers tout ensemble control the second/injected query they can use that query to opine information from a specified table. The result of this attack is that the database returns a dataset that is the union of the results of the original first query and the results of the injected second query. Example An attacker could inject the text UNION call for pass1 from user_info where LoginID=secret - nto the login house, which produces the following query SELECT pass1 FROM user_info WHERE loginID= UNION SELECT pass1 from user_info where LoginID=secret AND pass1= Assuming that there is no login allude to , the original first query returns the null set, whereas the second query returns data from the user_info table. In this case, the database would return column pass1 for account secret. The database takes the results of these two queries, unions them, and returns them to the application. In many applications, t he effect of this operation is that the tax for pass1 is displayed along with the account informationFigure 1 Example of . NET code implementation. 1. 2 Techniques of SQLIAS Most of the attacks are not in isolated they are use together or sequentially, depending on the specific goals of the attacker. a. Tautologies Tautology-based attack is to inject code in one or more conditional statements so that they always evaluate to true. The most common usages of this technique are to bypass au indeedtication pages and extract data. If the attack is successful when the code either displays all of the returned records or realizes some execute if at least one record is returned. Example In this example attack, an attacker submits or 1=1 -The Query for Login mode is SELECT * FROM user_info WHERE loginID= or 1=1 AND pass1= The code injected in the conditional (OR 1=1) transforms the entire WHERE clause into a tautology the query evaluates to true for for each one row in the table and re turns all of them. In our example, the returned set evaluates to a not null care for, which causes the application to conclude that the user au accordinglytication was successful. Therefore, the application would invoke method user_main. aspx and to access the application 6 7 8. c. Stored Procedures SQL Injection Attacks of this type try to execute stored single- judged functions present in the database.Today, most database vendors ship databases with a precedent set of stored procedures that extend the functionality of the database and allow for moveion with the operating system. Therefore, once an attacker determines which backend database is in use, SQLIAs can be crafted to execute stored procedures provided by that specific database, including procedures that interact with the operating system. It is a common misconception that using stored procedures to write Web applications renders them protected to SQLIAs. Developers are practically surprised to dislodge that their st ored procedures can be middling as vulnerable o attacks as their normal applications 18, 24. Additionally, because stored procedures are oft successions written in special scripting languages, they can contain other types of vulnerabilities, such as buffer over unravels, that allow attackers to run arbitrary code on the server or escalate their privileges. CREATE PROCEDURE DBO. UserValid(LoginID varchar2, pass1 varchar2 AS EXEC(SELECT * FROM user_info WHERE loginID= emailprotected+ and pass1= emailprotected+ )GO Example This example demonstrates how a parameterized stored procedure can be exploited via an SQLIA. In the example, we assume that the query string constructed at ines 5, 6 and 7 of our example has been replaced by a call IJCSNS International ledger of Computer Science and Network Security, VOL. 11 No. 1, January 2011 to the stored procedure delimit in Figure 2. The stored procedure returns a true/false value to indicate whether the users credentials authenticated corr ectly. To launch an SQLIA, the attacker obviously injects ending into either the LoginID or pass1 fields. This injection causes the stored procedure to pass the following query SELECT * FROM user_info WHERE loginID=secret AND pass1= SHUTDOWN -At this point, this attack works like a piggy-back attack.The first query is executed normally, and then the second, malicious query is executed, which results in a database shut down. This example shows that stored procedures can be vulnerable to the same range of attacks as traditional application code 6 11 12 10 13 14 15. d. Extended stored procedures IIS(Internet Information Services) Reset There are several across-the-board stored procedures that can cause permanent damage to a system19. Extended stored procedure can be executed by using login form with an injected command as the LoginId LoginIdexecmaster.. xp_xxx-PasswordAnything LoginIdexecmaster.. p_cmdshelliisreset-PasswordAnything select password from user_info where LoginId= exec master.. xp_cmdshell iisreset and Password= This Attack is utilize to barricade the answer of the web server of particular Web application. Stored procedures primarily comprise of SQL commands, while XPs can provide entirely new functions via their code. An attacker can take advantage of extended stored procedure by entering a suitable command. This is possible if there is no proper introduce validation. xp_cmdshell is a built-in extended stored procedure that allows the execution of arbitrary command lines. For example exec master.. p_cmdshell dir depart obtain a directory listing of the current running(a) directory of the SQL waiter process. In this example, the attacker may try entering the following input into a search form can be used for the attack. When the query string is parsed and sent to SQL Server, the server will process the following code SELECT * FROM user_info WHERE input text = exec master.. xp_cmdshell LoginId /DELETE 199 Here, the first single quote entered by the user closes the string and SQL Server executes the next SQL statements in the batch including a command to scratch a LoginId to the user_info table in the database. . hang on Encodings Alternate encryptions do not provide any unique way to attack an application they are simply an enabling technique that allows attackers to evade detection and prevention techniques and exploit vulnerabilities that might not otherwise be exploitable. These escapism techniques are often necessary because a common defensive coding practice is to scan for original known bad shells, such as single quotes and comment operators. To evade this defense, attackers have employed alternate methods of encoding their attack strings (e. g. , using hex, ASCII, and Unicode character encoding).Common scanning and detection techniques do not try to evaluate all specially encoded strings, thus allowing these attacks to go undetected. Contributing to the problem is that varied forms in an applicat ion have different ways of handling alternate encodings. The application may scan for certain types of escape characters that represent alternate encodings in its language domain. Another layer (e. g. , the database) may use different escape characters or even solely different ways of encoding. For example, a database could use the expression char(120) to represent an alternately-encoded character x, but char(120) has no special meaning in the application languages context. An rough-and-ready code-based defense against alternate encodings is difficult to implement in practice because it requires developers to consider of all of the possible encodings that could affect a given query string as it passes through the different application layers. Therefore, attackers have been very successful in using alternate encodings to moderate their attack strings. Example Because every type of attack could be represent using an alternate encoding, here we simply provide an example of how dee p an alternativelyencoded attack could appear.In this attack, the following text is injected into the login field secret exec(0x73687574646f776e) . The resulting query generated by the application is SELECT * FROM user_info WHERE loginID=secret exec(char(0x73687574646f776e)) AND pass1= This example makes use of the char() function and of ASCII hex encoding. The char() function takes as a parameter an integer or hexadecimal encoding of a character and returns an instance of that character. The stream of numbers in the second part of the injection is the 200 IJCSNS International daybook of Computer Science and Network Security, VOL. 11 No. , January 2011 ASCII hexadecimal encoding of the string SHUTDOWN. Therefore, when the query is interpreted by the database, it would result in the execution, by the database, of the SHUTDOWN command. References 6 f. Deny Database service This attack used in the websites to issue a denial of service by shutting down the SQL Server. A mighty co mmand recognized by SQL Server is SHUTDOWN WITH NOWAIT 19. This causes the server to shutdown, direct city blockping the Windows service. After this command has been issued, the service must be manually restarted by the administrator. select password from user_info whereLoginId=shutdown with nowait and Password=0 The character date is the single line comment sequence in Transact SQL, and the character denotes the end of one query and the beginning of another. If he has used the default sa account, or has acquired the required privileges, SQL server will shut down, and will require a restart in order to function again. This attack is used to stop the database service of a particular web application. Select * from user_info where LoginId=1xp_cmdshell format c/q /yes drop database mydb AND pass1 = 0 This command is used to format the C drive used by the ttacker. 2. Related Work There are existing techniques that can be used to detect and prevent input manipulation vulnerabiliti es. 2. 1 Web Vulnerability Scanning Web vulnerability scanners crawl and scan for web vulnerabilities by using software agents. These tools perform attacks against web applications, usually in a black-box fashion, and detect vulnerabilities by law-abiding the applications response to the attacks 18. However, without exact knowledge about the internal structure of applications, a black-box approach might not have enough test cases to observe existing vulnerabilities and also have alse positives. 2. 2 Intrusion Detection constitution (IDS) Valeur and colleagues 17 propose the use of an Intrusion Detection System (IDS) to detect SQLIA. Their IDS system is based on a machine learning technique that is train using a set of usual application queries. The technique builds models of the typical queries and then monitors the application at runtime to identify queries that do not match the model in that it builds expected query models and then checks dynamically-generated queries for com pliance with the model. Their technique, however, like most techniques based on learning, can generate large umber of false positive in the absence of an optimal training set. Su and Wassermann 8 propose a solution to prevent SQLIAs by analyzing the parse tree of the statement, generating custom-made validation code, and wrapping the vulnerable statement in the validation code. They conducted a study using five real world web applications and use their SQLCHECK wrapper to each application. They found that their wrapper stopped all of the SQLIAs in their attack set without generating any false positives. While their wrapper was effective in preventing SQLIAs with modern attack structures, we hope to shift the focus rom the structure of the attacks and onto removing the SQLIVs. 2. 3 Combined Static and Dynamic Analysis. memory loss is a model-based technique that combines static compend and runtime monitoring 17. In its static phase, AMNESIA uses static summary to build models of the different types of queries an application can de jure generate at each point of access to the database. In its dynamic phase, AMNESIA intercepts all queries before they are sent to the database and checks each query against the statically built models. Queries that violate the model are identified as SQLIAs and prevented from executing on the database.In their evaluation, the authors have shown that this technique performs well against SQLIAs. The primary demarcation line of this technique is that its success is dependent on the accuracy of its static synopsis for building query models. Certain types of code obfuscation or query development techniques could make this step less precise and result in both false positives and false negatives Livshits and Lam 16 use static analysis techniques to detect vulnerabilities in software. The basic approach is to use information flow techniques to detect when tainted input has been used to construct an SQL query. These ueries are then fl agged as SQLIA vulnerabilities. The authors demonstrate the viability of their technique by using this approach to find security vulnerabilities in a benchmark suite. The primary limitation of this approach is that it can detect only known patterns of SQLIAs and, IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 because it uses a ultraconservative analysis and has limited retain for untainting operations, can generate a comparatively high amount of false positives. Wassermann and Su propose an approach that uses static analysis combined with automated reasoning to verify that he SQL queries generated in the application layer cannot contain a tautology 9. The primary drawback of this technique is that its stretch is limited to detecting and preventing tautologies and cannot detect other types of attacks. 3. Proposed Technique This Technique is used to detect and prevent SQLIAs with runtime monitoring. The solution insights behind th e technique are that for each application, when the login page is redirected to our checking page, it was to detect and prevent SQL Injection attacks without stopping countenance accesses. Moreover, this technique proved to be efficient, imposing only a low overhead on the Web pplications. The contribution of this work is as follows A new automated technique for preventing SQLIAs where no code modification required, Webservice which has the functions of db_2_XMLGenrerator and XPATH_ Validator such that it is an XML query language to select specific parts of an XML document. XPATH is simply the ability to traverse leaf nodes from XML and obtain information. It is used for the temporary storage of sensitive datas from the database, nimble go for model is used to detect and prevent SQL Injection attacks. Service Detector model allow the evidence or legitimize user to access the web applications.The SQLIAs are captured by altered logical flow of the application. Innovative techniq ue (figure1) monitors dynamically generated queries with expeditious Guard model and Service Detector model at runtime and check them for compliance. If the Data Comparison violates the model then it represents potential SQLIAs and prevented from executing on the database. This proposed technique consists of two filtration models to prevent SQLIAS. 1) Active Guard filtration model 2) Service Detector filtration model. The steps are summarized and then describe them in more detail in following sections. a. Active Guard Filtration ModelActive Guard Filtration Model in application layer build a aptitude detector to detect and prevent the Susceptibility characters or Meta characters to prevent the malicious attacks from accessing the datas from database. b. Service Detector Filtration Model Service Detector Filtration Model in application layer validates user input from XPATH_Validator where the gauzy datas are stored from the Database at second 201 level filtration model. The user i nput fields compare with the data existed in XPATH_Validator if it is uniform then the Authenticated / decriminalise user is allowed to proceed. c. Web Service LayerWeb service builds two types of execution process that are DB_2_Xml generator and XPATH_ Validator. DB_2_Xml generator is used to create a separate temporary storage of Xml document from database where the Sensitive datas are stored in XPATH_ Validator, The user input field from the Service Detector compare with the data existed in XPATH_ Validator, if the datas are similar XPATH_ Validator send a flag with the count iterator value = 1 to the Service Detector by signifying the user data is valid. Procedures put to death in Active Guard feed stripQuotes(ByVal strWords) stripQuotes = Replace(strWords, , ) Return stripQuotesEnd Function Function killChars(ByVal strWords) thick arr1 As New ArrayList arr1. Add(select) arr1. Add() arr1. Add(drop) arr1. Add() arr1. Add(insert) arr1. Add(delete) arr1. Add(xp_) arr1. Add() p itch-dark i As Integer For i = 0 To arr1. see 1 strWords = Replace(strWords, arr1. Item(i), , , , CompareMethod. Text) Next Return strWords End Function IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 202 Figure 2 proposed Architecture Procedures Executed in Service Detector navi. Compile(/Main_Tag/ expositLoginId= & userName & and Password= & Password & ) _ domain Sub Db_2_XML() adapt=New SqlDataAdapter(select LoginId,Password from user_info, cn) Dim nodes As XPathNodeIterator = navi. Select(expr) Dim count2 As Integer = nodes. Count. ToString() Return count2 dst = New DataSet(Main_Tag) End Function adapt. Fill(dst, Details) dst. WriteXml(Server. MapPath(XML_DATAXML_D ATA. xml)) End Sub Procedures Executed in Web Service _ Public Function XPath_XML_ verification(ByVal userName As String, ByVal Password As Integer) As Integer Dim xpathdoc As New XPathDocument(Server. MapPath(XML_DATAX ML_DATA. xml)) Dim navi As XPathNavigator = x pathdoc. CreateNavigator() Dim expr As XPathExpression = . order hotspot This step performs a simple scanning of the application code to identify hotspots. Each hotspot will be verified with the Active Server to remove the susceptibility character the sample code (figure 2) states two hotspots with a single query execution. (In . NET based applications, interactions with the database occur through calls to specific methods in the System. Data. Sqlclient namespace, 1 such as Sqlcommand- . ExecuteReader (String)) the hotspot is instrumented with monitor code, which matches dynamically generated queries against query models. If a generated query is matched with Active Guard, then it is onsidered an attack. 3. 1 Comparison of Data at Runtime Monitoring When a Web application fails to properly sanitize the parameters, which are passed to, dynamically created SQL statements (even when using parameterization techniques) it is possible for an attacker to alter the construction of back-end SQL statements. IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 When an attacker is able to modify an SQL statement, the statement will execute with the same rights as the application user when using the SQL server to execute commands that interact with the operating system, the rocess will run with the same permissions as the component that executed the command (e. g. , database server, application server, or Web server), which is often highly privileged. Current technique (Figure 1) append with Active Guard, to validate the user input fields to detect the Meta character and prevent the malicious attacker. Transact-SQL statements will be prohibited directly from user input. For each hotspot, statically build a Susceptibility detector in Active Guard to check any malicious strings or characters append SQL tokens (SQL keywords and operators), delimiters, or string tokens to the legitimate command.Concurrently in Web service the DB_2_ Xml Generator generates a XML document from database and stored in X_PATH Validator. Service Detector receive the validated user input from Active Guard and send through the communications communications protocol max (Simple Object entrance money Protocol) to the web service from the web service the user input data compare with XML_Validator if it is identical the XML_Validator send a flag as a iterator count value = 1 to Service Detector through the SOAP protocol then the legitimate/valid user is Authenticated to access the web application, If the data mismatches the XML_Validator send a flag as a count alue = 0 to Service Detector through the SOAP protocol then the illegitimate/invalid user is not Authenticated to access the web application. In figure 3 In the existing technique query validation occur to validate a Authenticated user and the user directly access the database but in the current technique, there is no query validation . From the Active Guard the validated user inp ut fields compare with the Service Detector where the Sensitive data is stored, db_2_XML Generator is used to generate a XML file and initialize to the clan XPATH document the instance Navigator is used to search by using cursor in the selected XML document.With in the XPATH validator, Compile is a method which is used to match the element with the existing document. The navigator will be created in the xpathdocument using select method result will be redirected to the XPATH node iterator. The node iterator count value may be 1 or 0, If the flag value result in Service Detector as 1 then the user consider as Legitimate user and allowed to access the web application as the same the flag value result in Service Detector as 0 then the user consider as Malicious user and reject/ gaol from accessing the web application If the script builds an SQL query by concatenating hard-coded trings together with a string entered by the user, As long as injected SQL code is syntactically correct, ta mpering cannot be detected programmatically. String concatenation is the primary point of entry for script injection Therefore, 203 we Compare all user input carefully with Service Detector (Second filtration model). If the user input and Sensitive datas are identical then executes constructed SQL commands in the Application server. quick techniques directly allows accessing the database in database server after the Query validation. Web Service Oriented XPATH Authentication Technique does not allow directly to ccess database in database server. 4. EVALUATIONS The proposed technique is deployed and tried few trial runs on the web server. accede 1 SQLIAS Prevention Accuracy SQL Injection Types Unprotected protect 1. TAUTOLOGIES Not Prevented Prevented 2. PIGGY BACKED QUERIES Not Prevented Prevented 3. STORED PROCEDURE Not Prevented Prevented 4. alternate(a) ENCODING Not Prevented Prevented 5. UNION Not Prevented Prevented Table 2 capital punishment Time comparison for proposed t echnique Total Number of Entries in Database writ of execution Time in Millisecond vivacious Proposed Technique Technique one thousand 1640000 46000 2000 1420000 93000 3000 1040000 6000 4000 1210000 62000 5000 1670000 78000 6000 1390000 107000 The above given table 2 illustrate the execution time taken for the proposed technique with the existing technique. 4. 1 SQLIA Prevention Accuracy two the protected and unprotected web Applications are tested using different types of SQLIAs namely use of Tautologies, Union, Piggy-Backed Queries, Inserting additional SQL statements, Second-order SQL injection and various other SQLIA s. Table 1 shows that the proposed technique prevented all types of SQLIA s in all cases. The proposed technique is thus a secure and robust solution to defend against SQLIAsIJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 204 4. 2 performance Time at Runtime Validation The runtime validation incurs some overhea d in terms of execution time at both the Web Service Oriented XPATH Authentication Technique and SQL-Query based Validation Technique. Taken a sample website ETransaction measured the extra computation time at the query validation, this delay has been amplified in the graph (figure 4 and figure5) to distinguish between the Time delays using bar chart shows that the data validation in XML_Validator performs better than query validation.In Query validation(figure5) the user input is generated as a query in script engine then it gets parsed in to separate tokens then the user input is compared with the statistical generated data if it is malicious generates error reporting. Web Service Oriented XPATH Authentication Technique (figure 4) states that user input is generated as a query in script engine then it gets parsed in to separate tokens, and send through the protocol SOAP to Susceptibility Detector, then the validated user data is sequentially send to Service Detector through the pr otocol SOAP then the user input is ompared with the sensitive data, which is temporarily stored in dataset. If it is malicious data, it will be prevented otherwise the legitimate data is allowed to access the Web application. 5. mop up SQL Injection Attacks attempts to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. Any procedure that constructs SQL statements could potentially be vulnerable, as the diverse nature of SQL and the methods available for constructing it provide a riches of coding options. 1800000 Execution time in Milli Sec 1600000 1400000 1200000 000000 Proposed Technique Existing Technique 800000 600000 400000 200000 0 1000 2000 3000 4000 5000 6000 Total Number of Entries in Database Figure4 Execution Time comparison for proposed technique (data validation in X-path) with existing technique The primary form of SQL injection consists of direct insertion of code into parameters t hat are concatenated with SQL commands and executed. This technique is used to detect and prevent the SQLI flaw (Susceptibility characters & exploiting SQL commands) in Susceptibility Detector and prevent the Susceptibility attacker Web Service Oriented XPATH Authentication Technique hecks the user input with valid database which is stored separately in XPATH and do not affect database directly then the validated user input field is allowed to access the web application as well as used to improve the performance of the server side validation This proposed technique was able to suitably classify the attacks that performed on the applications without blocking legitimate accesses to the database (i. e. , the technique produced neither false positives nor false negatives). These results show that our technique represents a promising approach to countering SQLIAs and motivate further work in this irection References 1 William G. J. Halfond and Alessandro Orso , AMNESIA Analysis and Monit oring for Neutralizing SQLInjection Attacks, ASE05, November 711, 2005 2 William G. J. Hal fond and Alessandro Orso, A mixed bag of SQL injection attacks and countermeasures,proc IEEE intl Symp. dependable Software Engg. , Mar. 2006. IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 3 Muthuprasanna, Ke Wei, Suraj Kothari, Eliminating SQL Injection Attacks A TransparentDefenceMechanism, SQL Injection Attacks Prof. Jim whitenesshead CMPS 183. Spring 2006, May 17, 2006 4 William G. J. Hal fond, Alessandro Orso, WASP Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation IEEE Software Engineering, VOL. 34, NO. 1January/February 2008 5 K. Beaver, Achieving Sarbanes-Oxley compliance for Web applications, http//www. spidynamics. com/support/whitepapers/, 2003 6 C. Anley, Advanced SQL Injection In SQL Server Applications, White paper, Next multiplication Security Software Ltd. , 2002. 7 W. G. J. Halfond and A. Ors o, Combining Static Analysis and Runtime Monitoring to forestall SQL Injection Attacks, 3rd International Workshop on Dynamic Analysis, 2005, pp. 7 8 Z. Su and G. Wassermann, The Essence of Command Injection Attacks in Web Applications, 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006, pp. 372-382. 9 G. Wassermann and Z. Su. An Analysis Framework for Security in Web Applications. In proceeding of the FSE Workshop on Specification and Verification of componentBased Systems (SAVCBS 2004), pages 7078, 2004. 10 P. Finnigan, SQL Injection and Oracle Parts 1 & 2, Technical Report, Security Focus, November 2002. http//securityfocus. com/infocus/1644 11 F. Bouma, Stored Procedures are Bad, Okay, Technical report,Asp. Net Weblogs, November 2003. http//weblogs. asp. net/fbouma/archive/2003/11/18/38178. as px. 12 E. M. Fayo, Advanced SQL Injection in Oracle Databases, Technical report, Argeniss Information Security, low-spirited Hat Briefings, Black Hat USA, 2 005. 13 C. A. Mackay, SQL Injection Attacks and Some Tips on How to Prevent them, Technical report, The Code Project, January 2005. http//www. codeproject. com/cs/database/ qlInjectionAttacks. asp. 14 S. McDonald. SQL Injection Modes of attack, defense, and why it matters. White paper, GovernmentSecurity. org, April 2002. http//www. governmentsecurity. rg/articles/SQLInjectionM odesofAttackDefenceandWhyItMatters. php 15 S. Labs. SQL Injection. White paper, SPI Dynamics, Inc. ,2002. http//www. spidynamics. com/assets/documents/Whitepaper SQLInjection. pdf. 16 V. B. Livshits and M. S. Lam. Finding Security Errors in Java Programs with Static Analysis. In Proceedings of the 14th Usenix Security Symposium, pages 271286, Aug. 2005. 17 F. Valeur and D. Mutz and G. Vigna A Learning-Based Approach to the Detection of SQL Attacks, In Proceedings of the congregation on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA), July 2005. 18 Kals, S. Kirda, E. , Kruegel, C. , and J ovanovic, N. 2006. SecuBat a web vulnerability scanner. In Proceedings of the 205 15th International Conference on World Wide Web. WWW 06. ACM Press, pp. 247-256. 19 Sql injection HSC Guides Web App Security Written by Ethical Hacker sunday, 17 February 2008. http//sqlinjections. blogspot. com/2009/04/sql-injection-hscguides-web-app. html. Prof. E. Ramaraj is presently working as a Technology Advisor, Madurai Kamaraj University, Madurai, Tamilnadu, India on lien from Director, computer center of attention at Alagappa university, Karaikudi. He has 22 years teaching experience and 8 years esearch experience. He has presented research papers in more than 50 national and international conferences and published more than 55 papers in national and international journals. His research areas include Data mining, software engineering, database and communicate security. B. Indrani received the B. Sc. degree in Computer Science, in 2002 the M. Sc. degree in Computer Science and Information Technology, in 2004. She had completed M. Phil. in Computer Science. She worked as a Research Assistant in Smart and Secure Environment Lab under IIT, Madras. Her current research interests include Database Security.

No comments:

Post a Comment