期刊文献+

Web应用中SQL注入攻击研究 被引量:10

SQL Injection Attacks in Web Application
原文传递
导出
摘要 SQL注入攻击是一种利用客户端用户提交数据构成查询语句而没有对潜在有害字符进行处理就在Web应用后台数据库中执行,从而产生与应用预期不同结果的一种攻击手段。在Internet或企业内部网络中,对Web应用中进行SQL注入攻击大量存在。这种攻击手段很容易被攻击者利用,但是只要对Web应用采取合理的安全防护措施就可以阻止SQL注入的发生或减少攻击造成的损失。 SQL injection is a technique for exploiting the Web application that use client-supplied data for SQL queries and, without stripping potentially harmful characters, execute SQL queries in back-end database, thus producing an attack different from the expectation. In the Internet or intranet, remarkable numbers of SQL injections exist the Web application, which is easily exploited by attackers. However, proper countermeasures adopted in Web application could prevent SQL injections or reduce the loss resulted from the attacks.
出处 《信息安全与通信保密》 2010年第4期81-83,共3页 Information Security and Communications Privacy
关键词 SQL注入攻击 预防措施 WEB应用 盲注攻击 预处理语句 SQL injection attack countermeasure Web application blind SQLIAS prepared statements
  • 相关文献

参考文献7

  • 1Martin B,Brown M,Paller A.2009 CWE/SANS Top 25 Most Dangerous Programming Errors[EB/OL].[2009-10-23].http://cwe.mitre.org/top25/pdf/2009_cwe_sans_top_25.pdf.
  • 2Buehrer G,Weide B W,Sivilotti P A G.Using Parse Tree Validation to Prevent SQL Injection Attacks[C]//5th International Workshop on Software Engineering and Middleware.Lisbon,Portugal:[s.n.],2005:106-113.
  • 3张卓,薛质.Linux环境中基于PHP的SQL注入攻击与对策[J].信息安全与通信保密,2006,28(9):154-157. 被引量:4
  • 4王丽丽,彭一楠,王轶骏.浅析SQL盲注攻击的实现[J].信息安全与通信保密,2008,30(5):71-73. 被引量:5
  • 5Kieyzun A,Guo P J,Jayaraman K,et al.Automatic Creation of SQL Injection and Cross-site Scripting Attacks[C]//Proceedings of the 2009 IEEE 31st International Conference on Software Engineering.Vancouver,Canada:[s.n.],2009:199-209.
  • 6Halfond W G J,Orso A.AMNESIA:Analysis and Monitoring for NEutralizing SQL-injection Attacks[C]//Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering.Long Beach,CA,USA:[s.n.],2005:22-28.
  • 7陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18

二级参考文献6

  • 1[4]Charles C,Marjorie C,John K.Kylix开发人员指南[M],北京:人民邮电出版社,2002
  • 2[5]Loureiro N.Programming PHP with security in mind[J].Linux journal,2002,2002(102)
  • 3[1]Kost S.Introduction to SQL Injection Attacks for Oracle Developers[EB/OL].Integrigy Corporation,2004[2006-10-23].http://www.net-security.org/dl/articles/IntegrigyIntrotoSQLInjectionAttacks.pdf.
  • 4[2]Anley C.Advanced SQL Injection In SQL Server Applications[EB/OL].An NGSSoftware Insight Security Research(NISR),2002[2006-10-23].Publication,http://www.ngssoftware.com/papers/advanced_sql_injection.pdf.
  • 5[3]Anley C.(more)Advanced SQL Injection[EB/OL].An NGSSoftware Insight Security Research (NISR)Publication,2002[2006-10-23].http://www.ngssoftwamcom/papers/more_advanced_sql_injection.pdf.
  • 6[4]Cerrudo C.Manipulating Microsoft SQL Server Using SQL Injection[EB/OL].2002[2006-10-23].http://www.appsecinc.com/presentations/Manipulating_SQL_Server_Using__SQL_Injection.pdf.

共引文献22

同被引文献38

  • 1游丽贞,郭宇春,李纯喜.Ajax引擎的原理和应用[J].微计算机信息,2006,22(02X):205-207. 被引量:154
  • 2李骏,陈恭亮,杨树堂,张爱新.Ajax对Web应用程序安全的影响[J].信息安全与通信保密,2007,29(3):35-37. 被引量:6
  • 3陈小兵,张汉煜,骆力明,黄河.SQL注入攻击及其防范检测技术研究[J].计算机工程与应用,2007,43(11):150-152. 被引量:72
  • 4骆建佳,尧飘海,朱伟.AJAX框架在web服务中的应用[J].计算机系统应用,2007,16(7):86-90. 被引量:3
  • 5MARTIN Bob, BROWN Mason, PALLER Alan. 2009 CWE/ SANS Top 25 Most Dangerous Programming Errors[EB/OL]. (2009-11-29). http: //cwe.mitre.org/top25/pdf/2009_cwe_sans_ top_25.pdf.
  • 6OWASP.The Ten Most Critical Web Application Security Risks[EB/OL].(2010-10-14)[2010-10-22].http:∥www.owasp.org/index.php/Top_ 10_2010.
  • 7YUAN Xiong,YE Chang-Qing,ZHOU Ping-Kun. Space Medicine & Medical Engineering,1997,10(4):309(in Chinese)(袁雄,叶常青,周平坤.航天医学与医学工程,1997,10(4):309)
  • 8Newman H C et al. Int.J.Radiat.Biol,1997,71(4):347
  • 9OWASP. OWASP Top 10-2010 the ten most critical web appli- cation security risks [EB/OL]. [2011-09-20]. https://www. owasp, org/index, php/Category: OWASP_Top_Ten_Proiect.
  • 10Justin Clarke.SQL注入攻击与防御[M].黄晓磊,李化,译.北京:清华大学出版社,2010:64-67.

引证文献10

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部