Published July 19, 2013 | Version v1
Journal article Open

EARLY DETECTION OF SQL INJECTION ATTACKS

  • 1. Department of Computer Engineering, Kennesaw State University, Georgia, USA

Description

SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing. This paper presents a client-side approach to detect SQLI attacks1 . The client-side accepts shadow SQL queries from the server-side and checks any deviation between shadow queries with dynamic queries generated with user supplied inputs. We measure the deviation of shadow query and dynamic query based on conditional entropy metrics and propose four metrics in this direction. We evaluate the approach with three PHP applications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detect well-known SQLI attacks early at the client-side and impose negligible overhead.

Files

5413nsa04.pdf

Files (242.6 kB)

Name Size Download all
md5:b7286945cd9451cd0aac1edcb471a3e4
242.6 kB Preview Download