跳到主要导航 跳到搜索 跳到主要内容

DIAVA: A Traffic-Based Framework for Detection of SQL Injection Attacks and Vulnerability Analysis of Leaked Data

  • Haifeng Gu
  • , Jianning Zhang
  • , Tian Liu
  • , Ming Hu
  • , Junlong Zhou
  • , Tongquan Wei
  • , Mingsong Chen*
  • *此作品的通讯作者
  • East China Normal University
  • Nanjing University of Science and Technology
  • Tongji University

科研成果: 期刊稿件文章同行评审

摘要

SQL injection attack (SQLIA) is among the most common security threats to web-based services that are deployed on cloud. By exploiting web software vulnerabilities, SQL injection attackers can run arbitrary malicious code on target databases to acquire or compromise sensitive data. Although web application firewalls (WAFs) are offered by most cloud service providers, tenants are reluctant to pay for them, since there are few approaches that can report accurate SQLIA statistics for their deployed services. Traditional WAFs focus on blocking suspicious SQL requests. Few of them can accurately decide whether an attack is really harmful and quickly answer how severe the attack is. To raise the tenants' awareness of the seriousness of SQLIAs, in this paper, we introduce a novel traffic-based SQLIA detection and vulnerability analysis framework named DIAVA, which can proactively send warnings to tenants promptly. By analyzing the bidirectional network traffic of SQL operations and applying our proposed multilevel regular expression model, DIAVA can accurately identify successful SQLIAs among all the suspects. Meanwhile, the severity of such SQLIAs and the vulnerabilities of the corresponding leaked data can be quickly evaluated by DIAVA based on its GPU-based dictionary attack analysis engine. Experimental results show that DIAVA not only outperforms state-of-the-art WAFs in detecting SQLAs from the perspectives of precision and recall, but also enables real-time vulnerability evaluation of leaked data caused by SQL injection.

源语言英语
文章编号8771368
页(从-至)188-202
页数15
期刊IEEE Transactions on Reliability
69
1
DOI
出版状态已出版 - 3月 2020

指纹

探究 'DIAVA: A Traffic-Based Framework for Detection of SQL Injection Attacks and Vulnerability Analysis of Leaked Data' 的科研主题。它们共同构成独一无二的指纹。

引用此