期刊文献+

探究SQL注入攻击原理与实践 被引量:3

Exploring the Principles and Practices of SQL Injection Attacks
下载PDF
导出
摘要 为保障Web应用程序安全,研究SQL注入攻击具有重大意义。本文分析了SQL注入攻击原理及攻击类别,并基于SQLMap自动化注入工具模拟注入流程,基于卷积神经网络设计了SQL注入检测算法。实验结果表明,该方法能够有效阻断SQL注入,切实保障用户隐私安全。 In the purpose of enhancing the security of web applications,it is crucial to clduct a thorough study on SQL injection attacks.This paper analyzes the principles and various types of SQL injection attacks and simulates the injection process using the automated injection tool called SQLMap.Furthermore,the paper proposes a Convolutional Neural Networks based algorithm for detecting SQL injection.The experimental results demonstrate that this method effectively prevents SQL injection attacks and ensures the protection of user privacy.
作者 廖诚富 孙誉欣 郑家瑜 LIAO Chengfu;SUN Yuxin;ZHENG Jiayu(School of Computer Science,Hunan University of Technology and Business,Changsha,China,410205)
出处 《福建电脑》 2023年第7期66-69,共4页 Journal of Fujian Computer
基金 国家级大学生创新创业训练计划项目(No.202110554021X)资助。
关键词 SQL注入 卷积神经网络 网络安全 SQL Injection Convolutional Neural Network Network Security
  • 相关文献

参考文献6

二级参考文献34

  • 1张勇,李力,薛倩.Web环境下SQL注入攻击的检测与防御[J].现代电子技术,2004,27(15):103-105. 被引量:55
  • 2徐陋,姚国祥.SQL注入攻击全面预防办法及其应用[J].微计算机信息,2006,22(03X):10-12. 被引量:40
  • 3苑兆忠,姜华.Web挖掘技术在信息检索中的应用研究[J].聊城大学学报(自然科学版),2006,19(1):74-77. 被引量:4
  • 4SQL Server 安全回顾[EB/OL].http://www.microsoft.com/china/ctc/Newsletter/04/ctc2.htm.
  • 5Anley C.Advanced SQL injection in SQL server applications[EB/OL].http://www.creangel.com/papers/advanced_sql_injection.pdf,An NGS Software Insight Security Research (NISR) Publication,2002.
  • 6Litchfield D.Web application disassembly with ODBC error messages[EB/OL].http://81.cgisecurity.com/lib/webappdis.doc.
  • 7Sam M S.NG,SQLBlock:SQL injection protection by variable normalization of SQL statement[EB/OL].http://www.iem.pw.edu.pl/~kozlowk3 / biblioteczka / www_SQL / SQL_Injection_Protection_by_Variable_Normalization_of_SQL_Statement.pdf.
  • 8Geneiatakis D,Kambourakis G,Lambrinoudakis C.SIP message tampering the SQL code injection attack[EB/OL].http://www.snocer.org/Paper/camera-ready_soft_com.pdf.
  • 9Finnigan P.SQL injection and Oracle[EB/OL].[2002-11-21].http://wwworacledevelopernl/newforum/files/2002_11_21%20SecurityFocus%20SQL%20Injection%20and%20Oracle.pdf.
  • 10Cerrudo C.Manipulating Microsoft SQL server using SQL injection[EB/OL].http://injection.rulezz.ru/Manipulating_SQL_Server_Using_SQL_Injection.pdf.

共引文献189

同被引文献14

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部