期刊文献+

基于免疫机理的SQL注入攻击检测与防护算法 被引量:2

SQL Injection Attack Detection and Protection Algorithm Based on Immune Mechanism
下载PDF
导出
摘要 针对传统Web应用防火墙规则库过于庞大、且无法识别新的SQL注入变种攻击,通过深入分析和提取SQL注入的特征,提出了一种基于免疫机理的检测和防护算法。分别设计了基于模式匹配的静态检测模块和基于否定选择算法的动态检测模块,对检测器的生成算法做了改进,并引入基于MapReduce并行化处理机制加快了检测器的生成效率,实验仿真结果验证了该算法的正确性和有效性。 According to the fact that traditional Web application firewall rule base is too large,and can not recognize the new variant of SQL injection attacks(SQLIAs),through analyzing and extracting features of SQL injection,an SQLIAs detection and prevention algorithm based on immune mechanism is proposed.In this paper,we design the static detection pattern matching module and dynamic detection module based on negative selection algorithm.In the proposed algorithm,the method of generating detector is improved,and the parallel processing mechanism is put foward to accelerate the generation efficiency of the detector based on MapReduce.Experimental results verify the correctness and effectiveness of the algorithm.
作者 兰方鹏 崔晓红 LAN Fangpeng CU! Xiaohong(College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan 030024, Chin)
出处 《太原理工大学学报》 北大核心 2017年第5期833-840,共8页 Journal of Taiyuan University of Technology
基金 山西省基础研究资助项目:云环境下基于能耗驱动的资源调度免疫算法研究(2015021106) 山西省科技厅资助项目(2015021106)
关键词 SQL注入攻击 人工免疫 否定选择 MAPREDUCE SQL injection attacks artificial immune negative selection algorithm MapReduce
  • 相关文献

参考文献3

二级参考文献24

  • 1约翰·萨福克.华为2013年度安全研究报告[R].深圳:华为公司,2013.
  • 2360安全播报.企业网络的下一个噩梦:移动僵尸网络[EB/OL].[2014-11-21].http://bobao.360.cn/news/detail/916.html.
  • 3JIN Q,MING M.A method to construct self set for IDS based on negative selection algorithm[C].Proceedings of the2011 International Conference on Mechatronic Science,Electric Engineering and Computer.Piscataway:IEEE Press,2011:1051-1053.
  • 4MULLINER C,SEIFERTIN J.Rise of the i Bots:owning a telco network[C].Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software(Malware).Piscataway:IEEE Press,2010:19-20.
  • 5ZENG Y Y,HU X,SHIN K G.Design of SMS commandedand-controlled and P2P-structed mobile Botnet[C].Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks.New York:ACM Press,2012:137-148.
  • 6JAVED J,YASIN H,ALI S.Human movement recognition using euclidean distance:a tricky approach[C].Proceedings of 2010 3th International Congress on Image and Signal Processing.Piscataway:IEEE Press,2010:317-321.
  • 7Joachims T.Text categorization with support vector machines: Learning with many relevant features[].Proceedings of the th European Conference on Machine Learning.1998
  • 8ALMGREN M,,DEBAR H,DACIER M.A lightweight tool fordetecting web server attacks. Proceedings of Network andDistributed Systems Security . 2000
  • 9ALMGREN M,LINDQVIST U.Application-integrated data collection for security monitoring. RAID2001 . 2001
  • 10Garcia V H,Monroy R,Quintana M.Web attack detection using ID3[OL]. http://homepage.cem.itesm.mx/raulm/pub/id3-ids . 2013

共引文献23

同被引文献26

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部