Font Size: a A A

SQL Injection Automatic Dection Techniques Research

Posted on:2016-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:G M YangFull Text:PDF
GTID:2308330473454345Subject:Computer technology
Abstract/Summary:PDF Full Text Request
SQL injection existed when SQL databases first connected to Web applications. Rain Forest Puppy published a report about SQL injection in Christmas of 1998 for the first time, which introduced how to use SQL injection to attack awebsite. Foreign researchers started to research in related fields from 1999, while domestic research work surged from late 2002. However, up till now many developers and security professionals still do not understand it well. SQL injection vulnerabilities widely exist in Web applications. SQL injection vulnerability has always been a serious threat for Web Security, according to the Top Ten security vulnerabilities report published by OWASP and the security report published by 360 Security Center. A statistics from 360 Security Center showed that SQL injection vulnerabilities accounted for 14.5% of all detected vulnerabilities sites. Thus, SQL injection vulnerabilities persist. The main research topics are as follows:1. The background and significance of the SQL injection research are introduced, and the domestic and foreign SQL injection research status are presented.2. Thesis introduced the testing technology of SQL injection, including the method of locating and confirming SQL injection. Thesis described the remote penetration based method, including testing by inference, database errors,application response and blind injection detection etc. The confirmation of SQL injection depends on four methods, including differentiating numbers and strings, inline SQL injection, terminating SQL injection and time delays.3. Thesis did a detailed study of SQL injection exploit. After identifying SQL application injection vulnerabilities, the next step is to research how to use the SQL injection vulnerability. Thesis summarized five technologies of exploiting SQL injection,including common exploit techniques, identifying the database, extracting data through UINION statements, using conditional statements and enumerating database schema.4. After summarizing the existing SQL injection detection technologies, thesis proposed a hybrid SQL injection detection methods based on the combination of heuristic vulnerability detection, routine testing with vulnerability library and fuzzing test.5. Thesis researched the techniques of detecting and bypassing the web application firewall(WAF). Through payload encoding and confusion, they remove the obstacles for SQL injection detection. At the same time, we explored the SQL injection in mobile applications, HTML5 clients and other cutting-edge fields.6. Based on the hybrid SQL injection detection methods mentioned above completed the design, implementation and testing of the automated SQL injection detection system. The design and implementation of the key modules were described in detail. And thesis did a systematic test to make sure our system worked normally. The result of the test showed that our hybrid SQL injection detection method is effective, and it can perform the SQL injection detection to web applications automatically.
Keywords/Search Tags:SQL injection, Fuzz Testing, Penetration Testing, Database Security
PDF Full Text Request
Related items