期刊文献+

SQL注入攻击及其防范检测技术研究 被引量:72

Research on technique of SQL injection attacks and detection
下载PDF
导出
摘要 简要介绍了SQL注入攻击的原理,SQL注入攻击实现过程,配合网页木马实施网络入侵的方法,给出了SQL注入攻击的检测方法,并在此基础上给出了一种SQL注入攻击的自动防范模型。 This paper introduces the theory of SQL injection attacks and the process of implementation.The detecting technique of SQL injection attacks is investigated through combining with the Trojan-horses invading means of web.On this basis,a model of automatically detecting against SQL injection attacks is concluded.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第11期150-152,203,共4页 Computer Engineering and Applications
关键词 SQL注入攻击 防范检测技术 网页木马 SQL injection attacks detection technique Web Trojan-horse
  • 相关文献

参考文献9

  • 1SQL Server 安全回顾[EB/OL].http://www.microsoft.com/china/ctc/Newsletter/04/ctc2.htm.
  • 2Anley C.Advanced SQL injection in SQL server applications[EB/OL].http://www.creangel.com/papers/advanced_sql_injection.pdf,An NGS Software Insight Security Research (NISR) Publication,2002.
  • 3Litchfield D.Web application disassembly with ODBC error messages[EB/OL].http://81.cgisecurity.com/lib/webappdis.doc.
  • 4Sam M S.NG,SQLBlock:SQL injection protection by variable normalization of SQL statement[EB/OL].http://www.iem.pw.edu.pl/~kozlowk3 / biblioteczka / www_SQL / SQL_Injection_Protection_by_Variable_Normalization_of_SQL_Statement.pdf.
  • 5Geneiatakis D,Kambourakis G,Lambrinoudakis C.SIP message tampering the SQL code injection attack[EB/OL].http://www.snocer.org/Paper/camera-ready_soft_com.pdf.
  • 6Finnigan P.SQL injection and Oracle[EB/OL].[2002-11-21].http://wwworacledevelopernl/newforum/files/2002_11_21%20SecurityFocus%20SQL%20Injection%20and%20Oracle.pdf.
  • 7Cerrudo C.Manipulating Microsoft SQL server using SQL injection[EB/OL].http://injection.rulezz.ru/Manipulating_SQL_Server_Using_SQL_Injection.pdf.
  • 8徐陋,姚国祥.SQL注入攻击全面预防办法及其应用[J].微计算机信息,2006,22(03X):10-12. 被引量:40
  • 9张勇,李力,薛倩.Web环境下SQL注入攻击的检测与防御[J].现代电子技术,2004,27(15):103-105. 被引量:55

二级参考文献16

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2史创明.边缘网关协议BGP及漏洞攻击防范[J].微计算机信息,2005,21(07X):60-62. 被引量:6
  • 3Cesar Cerrudo.Manipulating microsoft SQL ser-ver using SQL injecti on.[EB/OL].http://www.appsecinc.com/presentations/Manipulat- ing_SQL_Server _using _SQL_Injection.pdf.2004-3-25.
  • 4SPI LABS.SQL Injection[EB/OL]. http://www.spidynamics.com/pa pers/SQL Injection WhitePaper.pdf.2004-3-25.
  • 5ANSI.DIS 90751992,Information technology - Database language SQL[S] .
  • 6ISO/IEC.ISO/IEC 9075:1992.Information technology - Database language SQL[S].
  • 7ISO/IEC.ISO/IEC 9075-5:1999.Information technology - Database language SQL[S].
  • 8WebCohort.WebCohort;s application defense center reports results of vulnerabil ity testing on Web applications.[EB/OL].http://www.imperva.com/com pany/news/2004-feb-02.html.2004-3-25.
  • 9Stephen Kost.An Introduction to SQL injection attacks for Oracle developers.[EB/OL].http://www.integrigy.com/papers.htm.200 4-3-25.
  • 10Chris Anley.Advanced SQL injection in SQL server applications.[EB/OL].http://www.nextgenss.com/research.html,2004-3-25.

共引文献83

同被引文献284

引证文献72

二级引证文献230

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部