Skip to main content

SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment

  • Conference paper
Information Security Applications (WISA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Included in the following conference series:

Abstract

Web applications employing database-driven content have become widely deployed on the Internet, and organizations use them to provide a broad range of services to people. Along with their growing deployment, there has been a surge in attacks that target these applications. One type of attack in particular, SQL injection, is especially harmful. SQL injections can give attackers direct access to the database underlying an application and allow them to leak confidential or even sensitive information. SQL injection is able to evade or detour IDS or firewall in various ways. Hence, detection system based on regular expression or predefined signatures cannot prevent SQL injection effectively. We present a detection mode for SQL injection using pairwise sequence alignment of amino acid code formulated from web application parameter database sent via web server. An experiment shows that our method detects SQL injection and, moreover, previously unknown attacks as well as variations of known attacks.

This work was supported (in part) by the Ministry of Information & Communications, Korea, under the Information Technology Research Center (ITRC) Support Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aucsmith, D.: Creating and maintaining software that resists malicious attack. Distinguished Lecture Series, Atlanta, GA (September 2004), http://www.gtisc.gatech.edu/aucsmith_bio.htm

  2. OWASPD – Open Web Application Security Project. Top ten most critical web application vulnerabilities (2005), http://www.owasp.org/documentation/topten.html

  3. Scambray, J., Shema, M., Wong, D.: Hacking Exposed Web Applications. Osborne Media (2002)

    Google Scholar 

  4. Finnigan, P.: Oracle Security Step-by-step. SANS Institute (2002), http://www.securityfocus.com

  5. CERT Coordination Center. Overview of attack trends. Technical report CERT CC (2002)

    Google Scholar 

  6. Chapela, V.: Advanced SQL injection. OWASP (2005), http://www.owasp.org/docroot/owasp/misc/Advanced_SQL_Injection.ppt

  7. Anley, C.: (more) Advanced SQL Injection. An NGS Software Insight Security Research (NISR) (2002)

    Google Scholar 

  8. Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)

    Article  Google Scholar 

  9. Bykova, M., Ostermann, S., Tjaden, B.: Detecting network intrusions via a statistical analysis of network packet characteristics. In: Proceedings of the 33rd Southeastern Symposium on System Theory (2001)

    Google Scholar 

  10. Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. In: Proceedings of the IDS Workshop of the 7th Computer and Communications Security Conference, Athens (2000)

    Google Scholar 

  11. Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the ACM symposium on Applied computing, ACM Press, New York (2002)

    Google Scholar 

  12. Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. 48, 443–453 (1970)

    Article  Google Scholar 

  13. Waterman, M.S., Smith, T.F., Beyer, W.A.: Some biological sequence metrics. Adv. Math. 20, 367–387 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  14. OWASP. vulnerability (2006), http://www.owasp.org/index.php/Category:Vulnerability

  15. Barkan, D.: A parallel implementation of the Needleman-Wunsch algorithm for global gapped pair-wise alignment. Journal of Computing Sciences in Colleges 17(Issue 6) (2002)

    Google Scholar 

  16. Cohen, J.: Bioinformatics—an introduction for computer scientists. ACM Computing Surveys (CSUR) 36(Issue 2) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Park, JC., Noh, BN. (2007). SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics