期刊文献+

基于AOP与SQL结构分析的SQLIAs动态检测及防御 被引量:3

Dynamic Detection and Defense of SQLIAs Based on AOP and SQL Structure Analysis
下载PDF
导出
摘要 SQL注入攻击(SQLIAs)是一种危险且有效的基于Web的攻击方式。任何形式的SQLIAs最终都会改变原有SQL语句的逻辑结构,针对该攻击特征,提出一种基于AOP与SQL语句结构分析的SQLIAs动态检测及防御方法,在SQLIAs产生根源对其进行防御。借助代码静态分析工具自动获取SQL注入点位置、Signature信息以及静态SQL语句模型,使用AOP技术在程序执行过程中动态捕获需要被执行的SQL语句,将静态分析得到的信息与动态获取的信息进行比较,判断是否存在SQLIAs。通过简单的用户登录功能验证该方法的有效性,实验结果表明,该方法能有效检测和防御SQLIAs。 The SQL Injection Attacks(SQLIAs)is a dangerous and effective Web-based attacks way.According to the characteristics of SQLIAs,that is,any form of attacks will eventually change the logical structure of SQL statement,a method of dynamic detection and defense for the SQLIAs based on Aspect-Oriented Programming(AOP)and the analysis of SQL statement structure is proposed,which can defend against SQLIAs from the root of the attack.Firstly,obtain the location of SQLIAs,signature,and the static SQL statement model automatically by using code Analyzer.Then,capture the executed SQL statement dynamically by using AOP during the process of program execution.Finally Judge whether there is a SQLIAs by making the information obtained by static analysis compare with the dynamic information.The effectiveness of the method is verified by a simple user login function,and the experimental results show that the proposed method can detect and defend the SQLIAs effectively.
作者 何成万 青旺 徐雅琴 严柯 HE Chengwan;QING Wang;XU Yaqin;YAN Ke(School of Computer Science and Engineering,Wuhan Institute of Technology,Wuhan 430205,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第4期154-160,共7页 Computer Engineering
基金 国家自然科学基金(61272115 60873024)
关键词 SQL注入攻击 面向方面编程 攻击特征 动态检测 逻辑结构 SQL Injection Attacks(SQLIAs) Aspect-Oriented Programming(AOP) attack characteristic dynamic detection logical structure
  • 相关文献

参考文献1

二级参考文献20

  • 1Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2): 381-395.
  • 2Chien H-Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 3Bogdanov A, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y. Hash functions and RFID tags: Mind the gap. Lecture Notes in Computer Science, 2008, 5154: 283-299.
  • 4Juels A, Weis S A. Authenticating pervasive devices with human protocols. Lecture Notes in Computer Science, 2005, 3126: 293-308.
  • 5Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Lecture Notes in Computer Science, 2004, 3156: 85-140.
  • 6Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags-A comparison of low-power hardware implementations. In: Proceedings of IEEE International Symposium on Circuits and Systems, 2007: 1839-1842.
  • 7Weis S, Sarma S, Rivest R, Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Lecture Notes in Computer Science, 2004, 2802: 201-212.
  • 8Juels A, Weis S. Defining strong privacy for RFID. ACM Transactions on Information and System Security, 2009, 13(1): No. 7.
  • 9Lim J, Kim S, Oh H. A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. Lecture Notes in Computer Science, 2008, 4991: 278-289.
  • 10Kim S, Lim J, Han J, Oh H. Efficient RFID search protocols using counters. IEICE Transactions on Communications, 2008, E91-B(ll): 3552-3559.

共引文献3

同被引文献26

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部