期刊文献+

SQLMVED:基于多变体执行的SQL注入运行时防御系统 被引量:3

SQLMVED:SQL injection runtime prevention system based on multi-variant execution
下载PDF
导出
摘要 SQL解析过程中利用随机化进行SQL注入攻击(SQLIA)防御的有效性是建立在攻击者不了解当前系统采用的具体随机化方法的基础上,因此,攻击者一旦掌握了当前系统的随机化形式,便能够实施有效的SQLIA。为了解决该问题,基于多变体执行设计出一种SQL注入运行时防御系统,多变体间采用互不相同的随机化方法,攻击者注入的非法SQL无法同时被所有变体解析成功,即使在攻击者掌握了随机化方法的情况下,非法SQL也最多只能被某一变体解析成功,利用表决机制对多变体的响应结果或解析结果进行表决,及时发现异常,阻断SQLIA的攻击路径。面向Web服务实现了原型系统SQLMVED,实验证明该系统能够有效抵御SQLIA。 The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack(SQLIA)was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore,once attackers had mastered the current method of randomization who can launch effective SQLIA.In order to solve this problem,a SQL injection runtime prevention system based on multi-variant execution was designed,the multi-variant apply randomization methods from any other,so that illegal SQL statements could not be parsed successfully by all variants.Even if attackers had mastered the method of randomization,illegal SQL statements could only be parsed successfully by a certain variant at most,meanwhile the parsing results of multiple variants were voted to find the abnormality in time and block attack path.The prototype system SQLMVED is implemented for Web services and experiments show that the prototype can effectively defeat SQLIA.
作者 马博林 张铮 刘浩 邬江兴 MA Bolin;ZHANG Zheng;LIU Hao;WU Jiangxing(Information Engineering University,Zhengzhou 450001,China;Purple Mountain Laboratories,Nanjing 211100,China)
出处 《通信学报》 EI CSCD 北大核心 2021年第4期127-138,共12页 Journal on Communications
基金 国家自然科学基金资助项目(No.61521003) 国家重点研发计划基金资助项目(No.2018YFB0804003)。
关键词 SQL注入攻击 运行时防御 多变体执行 随机化 SQL injection attack runtime prevention multi-variant execution randomization
  • 相关文献

参考文献11

二级参考文献85

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:161
  • 3韩京宇,徐立臻,董逸生.一种大数据量的相似记录检测方法[J].计算机研究与发展,2005,42(12):2206-2212. 被引量:32
  • 4孙红兵,陈沫,蔡一兵,李忠诚.IPv4/IPv6转换网关性能测试方法研究[J].计算机工程,2006,32(24):93-95. 被引量:3
  • 5BABCOCK B. BABU S. DATAR M. Models and issues in data streams[A]. Proc of the 21st ACMSIGACT-SIGMOD-SIGART Syrup on Principles of Database Systems[C]. Madison: ACM Press, 2002. 1-16.
  • 6ANAND A, MUTHUKRISHNAN C, AKELLA A. Redundancy in network traffic: findings and implications[A]. Proc of SIGMETRICS[C]. Seattle, WA, USA, 2009.37-48.
  • 7WANG X, ZHANG Q, JIA Y. Efficiently filtering duplicates over distributed data streams[A]. International Conference on Computer Science and Software Engineering (CSSE)[C]. 2008.631-634.
  • 8E DENG; D. RAFIEI. Approximately detecting duplicates for streaming data using stable bloom filters[A]. Proc 2006 ACM SIGMOD Intemational Conference on Management of Data (SIGMOD) [C]. Chi-cago, Illinois, USA, 2006.25-36.
  • 9METWALLY D, AGRAWAL A E. ABBADI. Duplicate detection in click streams[A]. Proc 14th International World Wide Web Conference (WWW)[C]. Chiba, Japan, 2005.12-21.
  • 10V. GARG~ A. NARANG~ S. BHATFACHERJEE. Real-time memory efficient data redundancy removal algorithm[A]. CIKM[C]. 2010. 1259-1268.

共引文献308

同被引文献17

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部