Abstract
Web applications employing database-driven content have become widely deployed on the Internet, and organizations use them to provide a broad range of services to people. Along with their growing deployment, there has been a surge in attacks that target these applications. One type of attack in particular, SQL injection, is especially harmful. SQL injections can give attackers direct access to the database underlying an application and allow them to leak confidential or even sensitive information. SQL injection is able to evade or detour IDS or firewall in various ways. Hence, detection system based on regular expression or predefined signatures cannot prevent SQL injection effectively. We present a detection mode for SQL injection using pairwise sequence alignment of amino acid code formulated from web application parameter database sent via web server. An experiment shows that our method detects SQL injection and, moreover, previously unknown attacks as well as variations of known attacks.
This work was supported (in part) by the Ministry of Information & Communications, Korea, under the Information Technology Research Center (ITRC) Support Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aucsmith, D.: Creating and maintaining software that resists malicious attack. Distinguished Lecture Series, Atlanta, GA (September 2004), http://www.gtisc.gatech.edu/aucsmith_bio.htm
OWASPD – Open Web Application Security Project. Top ten most critical web application vulnerabilities (2005), http://www.owasp.org/documentation/topten.html
Scambray, J., Shema, M., Wong, D.: Hacking Exposed Web Applications. Osborne Media (2002)
Finnigan, P.: Oracle Security Step-by-step. SANS Institute (2002), http://www.securityfocus.com
CERT Coordination Center. Overview of attack trends. Technical report CERT CC (2002)
Chapela, V.: Advanced SQL injection. OWASP (2005), http://www.owasp.org/docroot/owasp/misc/Advanced_SQL_Injection.ppt
Anley, C.: (more) Advanced SQL Injection. An NGS Software Insight Security Research (NISR) (2002)
Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)
Bykova, M., Ostermann, S., Tjaden, B.: Detecting network intrusions via a statistical analysis of network packet characteristics. In: Proceedings of the 33rd Southeastern Symposium on System Theory (2001)
Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. In: Proceedings of the IDS Workshop of the 7th Computer and Communications Security Conference, Athens (2000)
Krügel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of the ACM symposium on Applied computing, ACM Press, New York (2002)
Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. 48, 443–453 (1970)
Waterman, M.S., Smith, T.F., Beyer, W.A.: Some biological sequence metrics. Adv. Math. 20, 367–387 (1976)
OWASP. vulnerability (2006), http://www.owasp.org/index.php/Category:Vulnerability
Barkan, D.: A parallel implementation of the Needleman-Wunsch algorithm for global gapped pair-wise alignment. Journal of Computing Sciences in Colleges 17(Issue 6) (2002)
Cohen, J.: Bioinformatics—an introduction for computer scientists. ACM Computing Surveys (CSUR) 36(Issue 2) (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Park, JC., Noh, BN. (2007). SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-71093-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71092-9
Online ISBN: 978-3-540-71093-6
eBook Packages: Computer ScienceComputer Science (R0)