skip to main content
10.1145/2948992.2949001acmotherconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
poster

Testing Snort with SQL Injection Attacks

Authors Info & Claims
Published:20 July 2016Publication History

ABSTRACT

Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this paper, we provide an overview of Snort and evaluate its ability to detect SQL Injection attacks.

References

  1. R. Santos, J. Bernardino, and M. Vieira, "Approaches and Challenges in Database Intrusion Detection", SIGMOD Record, vol. 43, no. 3, pp 36--47, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Park, and S. Ahn, "Performance Comparison and Detection Analysis in Snort and Suricata Environment", Springer Science+Business Media New York 2016, 2016.Google ScholarGoogle Scholar
  3. A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, "Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices", ACM Computing Surveys, vol. 48, no. 1, pp. 12--61, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Singh, D. Patel, B. Borisaniya, and C. Modi, "Collaborative IDS Framework for Cloud", International Journal of Network Security, vol.18, no. 4, pp. 699--709, 2016Google ScholarGoogle Scholar
  5. Victor, Truica. Understanding the Snort architecture, 2014. Available: http://truica-victor.com/snort-architecture/. {Accessed: 28-March-2016}.Google ScholarGoogle Scholar
  6. D. Kindy, and A. Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies", International Journal, pp. 1--13, 2012Google ScholarGoogle Scholar
  1. Testing Snort with SQL Injection Attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        C3S2E '16: Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering
        July 2016
        152 pages
        ISBN:9781450340755
        DOI:10.1145/2948992

        Copyright © 2016 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 July 2016

        Check for updates

        Qualifiers

        • poster
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate12of42submissions,29%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader