Approach to detecting SQL injection behaviors in network environment

SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016034/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539592227913728
author Yu-fei ZHAO
Gang XIONG
Long-tao HE
Zhou-jun LI
author_facet Yu-fei ZHAO
Gang XIONG
Long-tao HE
Zhou-jun LI
author_sort Yu-fei ZHAO
collection DOAJ
description SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length, HTTP connections and feature string were discovered. Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. The results of experiments indicated that in simulation environments the recall of LFF approach reach up to 95%, and in real network traffic the LFF approach also get a good detection result.
format Article
id doaj-art-89fcedf80c2f4ff6a053653da2a4e8b6
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-89fcedf80c2f4ff6a053653da2a4e8b62025-01-14T06:54:49ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-02-0137899859699267Approach to detecting SQL injection behaviors in network environmentYu-fei ZHAOGang XIONGLong-tao HEZhou-jun LISQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length, HTTP connections and feature string were discovered. Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. The results of experiments indicated that in simulation environments the recall of LFF approach reach up to 95%, and in real network traffic the LFF approach also get a good detection result.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016034/Web securitySQL injectionnetwork trafficoutlier detection
spellingShingle Yu-fei ZHAO
Gang XIONG
Long-tao HE
Zhou-jun LI
Approach to detecting SQL injection behaviors in network environment
Tongxin xuebao
Web security
SQL injection
network traffic
outlier detection
title Approach to detecting SQL injection behaviors in network environment
title_full Approach to detecting SQL injection behaviors in network environment
title_fullStr Approach to detecting SQL injection behaviors in network environment
title_full_unstemmed Approach to detecting SQL injection behaviors in network environment
title_short Approach to detecting SQL injection behaviors in network environment
title_sort approach to detecting sql injection behaviors in network environment
topic Web security
SQL injection
network traffic
outlier detection
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016034/
work_keys_str_mv AT yufeizhao approachtodetectingsqlinjectionbehaviorsinnetworkenvironment
AT gangxiong approachtodetectingsqlinjectionbehaviorsinnetworkenvironment
AT longtaohe approachtodetectingsqlinjectionbehaviorsinnetworkenvironment
AT zhoujunli approachtodetectingsqlinjectionbehaviorsinnetworkenvironment