A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy
碩士 === 中原大學 === 資訊工程研究所 === 99 === With Web2.0 as the dominant web service model, the majority of dynamic web services adopted the system structure with front end web application programs responsible for customized web page generation and back end database serving as data repository such that flexi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/97401110032725711181 |
id |
ndltd-TW-099CYCU5392039 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099CYCU53920392015-10-13T20:23:26Z http://ndltd.ncl.edu.tw/handle/97401110032725711181 A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy 以合理輸入值驗證為基礎之組合型SQL指令植入式攻擊防禦 An-Na Lee 李安娜 碩士 中原大學 資訊工程研究所 99 With Web2.0 as the dominant web service model, the majority of dynamic web services adopted the system structure with front end web application programs responsible for customized web page generation and back end database serving as data repository such that flexible and customizable dynamic services can be easily achieved. However, it comes with the price of the potential risk of SQL injection attacks which may lead to data theft or content destruction, even database crash. Filtering user inputs and blocking those from which SQL injection attack may be formed can prevent attacks from happening. Among the solutions adopting the input validation strategy, a two step input validation method consisting of performing static analysis on web applications for collecting input attribute information as well as applying dynamic analysis on run-time submitted user inputs according its attributes can provide adequate protection against SQL injection attack while preventing malicious user from obtaining error messages. However, a SQL command can be a product of a sequence of operations crossing multiple web application program boundaries, and a parameter in a SQL command can be the composition of multiple-inputs. In this thesis, we extended the original two-step input-validation method so that web applications with multiple page SQL command formulation as well as multi-input parameter can be protected. We devise an enhanced static analysis procedure to discover the composition sequence of multi-page-generated SQL command as well as the relation between user inputs and corresponding SQL parameters. We also proposed a modified dynamic analysis procedure to validate inputs according to the information obtained from the static analysis. A prototype system has been developed and tested. The result shows that our proposed enhanced two-step input-validation method can defend a web application against multi-page and multi-input SQL injection attacks. Hsiao-Rong Tyan 田筱榮 2011 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 資訊工程研究所 === 99 === With Web2.0 as the dominant web service model, the majority of dynamic web services adopted the system structure with front end web application programs responsible for customized web page generation and back end database serving as data repository such that flexible and customizable dynamic services can be easily achieved. However, it comes with the price of the potential risk of SQL injection attacks which may lead to data theft or content destruction, even database crash. Filtering user inputs and blocking those from which SQL injection attack may be formed can prevent attacks from happening. Among the solutions adopting the input validation strategy, a two step input validation method consisting of performing static analysis on web applications for collecting input attribute information as well as applying dynamic analysis on run-time submitted user inputs according its attributes can provide adequate protection against SQL injection attack while preventing malicious user from obtaining error messages. However, a SQL command can be a product of a sequence of operations crossing multiple web application program boundaries, and a parameter in a SQL command can be the composition of multiple-inputs. In this thesis, we extended the original two-step input-validation method so that web applications with multiple page SQL command formulation as well as multi-input parameter can be protected. We devise an enhanced static analysis procedure to discover the composition sequence of multi-page-generated SQL command as well as the relation between user inputs and corresponding SQL parameters. We also proposed a modified dynamic analysis procedure to validate inputs according to the information obtained from the static analysis. A prototype system has been developed and tested. The result shows that our proposed enhanced two-step input-validation method can defend a web application against multi-page and multi-input SQL injection attacks.
|
author2 |
Hsiao-Rong Tyan |
author_facet |
Hsiao-Rong Tyan An-Na Lee 李安娜 |
author |
An-Na Lee 李安娜 |
spellingShingle |
An-Na Lee 李安娜 A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
author_sort |
An-Na Lee |
title |
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
title_short |
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
title_full |
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
title_fullStr |
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
title_full_unstemmed |
A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy |
title_sort |
defense against compositional sql injection attack through validation on input legitimacy |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/97401110032725711181 |
work_keys_str_mv |
AT annalee adefenseagainstcompositionalsqlinjectionattackthroughvalidationoninputlegitimacy AT lǐānnà adefenseagainstcompositionalsqlinjectionattackthroughvalidationoninputlegitimacy AT annalee yǐhélǐshūrùzhíyànzhèngwèijīchǔzhīzǔhéxíngsqlzhǐlìngzhírùshìgōngjīfángyù AT lǐānnà yǐhélǐshūrùzhíyànzhèngwèijīchǔzhīzǔhéxíngsqlzhǐlìngzhírùshìgōngjīfángyù AT annalee defenseagainstcompositionalsqlinjectionattackthroughvalidationoninputlegitimacy AT lǐānnà defenseagainstcompositionalsqlinjectionattackthroughvalidationoninputlegitimacy |
_version_ |
1718047359480365056 |