Document 14671442

advertisement
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
An Overview to SQL Injection Attacks and its
Countermeasures.
in database centric web applications [Elia et
al., 2010] because this type of attack can
Vishwajit S. Patil
comprise confidentiality and integrity of
Department of CSE
information in database [Tajpour A et al.,
P.R.M.C.E.A.M Bandera, Amravati
vishwajit55@gmail.com
Dr. G. R. Bamnote
Professor & Head,
Department of CSE
P.R.M.I.T.& R. Bandera, Amravati
2010].
Keyword: web application attacks, XSS,
CSRF, SQLIA, and SQLIV.
Literature survey of SQL injection
grbamnote@rediffmail.com
Abstract:
22
Web
applications are those
applications which run in web browser.
These applications are accept some data and
send it to database for further processing.
SQL injection is the attacks related
to backend database results in unauthorized
acess to private or confidential information
stored [Kiani M et al., 2008]. Also attacker
intrudes to the web application data base to
IJOART
There are number of attacks on web
acess the data [Tajpour & JorJor Zade,
application like cross site scripting, cross
2010].
site request forgery but SQL injection
vulnerability ( SQLIV) through successful
attacks are the most prominent. Number of
attacks might results in authentication
papers in literature has been projected ways
bypassing, leaking of private information etc
to avoid SQL injection attacks by examining
[Shahriar, H & Zulkernine, M]. SQL
dynamic SQL query semantics at runtime in
injection attacks are very harmful as they
the application layer. This paper contains the
targets interactive web application that
study
employs
of
SQLIA
and
its prevention
Exploitation of
database
SQL
injection
[Wei
services.
&
techniques. SQL injection attacks on web
Muthuprasanna, 2006]. The SQL injection
application have become one of the most
attacks allow an attacker to access the
important information security concerns
underlying
database,
[Pinzo’n C et al., 2010]. These SQL
commands
at
injection attacks are extremely widespread
dynamically generated output [Kosuga et
and posses a serius security threat [Khoury
al., 2007].
et al., 2011]. In today’ s world SQL injection
I f web application containing vulnerability
is one of the most dangerous security threats
can allows malicious users to obtain
Copyright © 2014 SciResPub.
intent
execute
and
arbitrary
receive
a
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
and
black box testing is used. According to
information.This mechanism
author sql injection is the most critical web
unrestricted
confidential
23
access
to
private
used by hackers to steal
data from
application
vulnerability.
Author
also
organization. It allows a hacker to gain
mentioned that black box scanners are
control over the database of an application
having some weaknesses. It is not good
and consequently hackers may be able to
enough to identify vulnerable program that
alter data [Shanmughaneethi et al., 2009].
An attacker can inject in the original SQL
query and obtain, change or view data.
An overview of prevention techniques.
1. AIIDA- SQL
browses world wide web in a methodical,
automated manner called as web crawling ,
user login etc. the black box testing tool had
poor
detection
rate
so
that
author
proposed a set of recommendation that
could enhance the rate of detection
[Khoury et al., 2011].
IJOART
This prevention techniques works against
SQL injection attacks and proposed by the
author. They mentioned that SQL injection
attacks are the most critical attacks from
the web application. The techniques against
SQLIA called Adaptive Intelligent Intrusion
Detector Agent (AIIDA- SQL) According to
author; the experimental results using this
technique are good in real practice [Pinzo’n
C et al., 2010].
3. Augmented attack tree modeling
SQL injection attacks are classified into
seven types [J. Viegas et al.,2006]
a. Tautologies
b. Legal/Logical Incorrect queries
c. UNION query
d. Piggy – Backed Queries
e. Stored procedures
f. Inference and alternate encoding
There are two types of attack tree modeling
2. Black Box Web Application Security
Scanner
Standards security features are not enough
to protect web application form hacking,
threats, SQL injection, XSS, CSRF and hence
Copyright © 2014 SciResPub.
[Jie Wang et al., 2010]
i.
Conventional Attack trees
ii.
Augmented Attack tree
These attack tree model not only applicable
to SQLIA but also Cross Site Request Forgery
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
24
Attacks (CSRF). The method presented by
The author used anomaly based approach
author is generic and hence it can be
to detect SQL injection attacks and it is
applicable to other kinds of web based
superior to existing model which works
attacks.
against SQLIV [Kiani M et al., 2008]. VIPER
4. Automated fix generator
tool
for
penetration
[Angelo
testing
SQL injection is example of taint based
Ciampa] .
vulnerability that has been responsible for a
According to authors, they have suggested a
large number of security failure to perform
tool called VIPER to perform penetration
some promised act or obligation in recent
testing of web applications. This tool relies
years. Untrusted data from the user is
on a knowledge base of heuristics that
tracked when it flows unsafely into a
guides the generation of the SQL queries.
security
This tool first identifies the hyperlink
critical
operation
and
hence
vulnerability is flagged. In SQL injection the
structure and its input form.
IJOART
user can add some additional conditions or
5. Hidden web crawling [Xin et al.,
commands to a database query, thus
2010].
allowing the user to bypass authentication
prominent issues in today’s World
or alter data. Automated fix generator
Wide
detects and fix sql queries that contains SQL
vulnerability scanners are available
injection vulnerability (SQLIV). For testing
but they are unable to fulfill the
purpose author used phpBB v2.0 [Dysart &
requirements. Author proposed a
Sherriff, 2008]. Anomaly Based Character
mechanism based on hidden web
Distribution Models
crawling to achieve the goal. The
The anomaly detection process uses a
authors also compare their tool with
number of different models to identify
other
anomalous state for each basic block of a
tested on the public web sites. The
web application. A model is a set of
results show that the proposed tool
procedure used to evaluate a certain
is good over the traditional web
features of a state variable associated with
scanners.
SQLIV
Web.
are
Many
traditional
the
most
traditional
scanners
and
the block.
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
6. High interaction Honeypot System
[Jiao Ma et al., 2011]
25
Vulnerability checking proposed by the
author which is good enough to protects
Honeypots are a very original approach to
such types of attacks which is not address
computer security. The honeypot are
by the existing testing approaches. The
classified in two categories
discovered vulnerabilities can be fixed and
a. Low interaction : fake services
the losses incurred by end user can be
b. High interaction : complete access
prevented.
Here authors proposed a high interaction
honeypot system against SQLIV. They used
two approaches.
stored procedures
This prevention mechanism proposed
a. Modifying PHP extension for mysql
to intercept data based request
b. Adopting
8. Preventing SQL injection attacks in
exception
based
by the authors. According to authors
stored procedures acts as a medication
and
against SQL injection attacks. A stored
detection
procedure is nothing but a subroutine
IJOART
signature
based
techniques.
available to application that accesses a
The results show that this system is very
relational
efficient against SQLIV.
techniques proposed in this paper by
7. MUSIC
database
system.
The
author to eliminate the occurrence of
Many vulnerability are discovered after the
such attacks are a permutation of static
deployment of software implementation
application code analysis with runtime
such as buffer overflows, sql injection and
validation
format string bug are the most commonly
Conclusion
occurring
software
9. SQL injection is most powerful and
implementation [Shahriar, H & Zulkernine,
easiest attack method on web
M].
service
application [Pinzo’n C et al., 2010].
exploitation alone cost more than 26 million
The effects of these attacks may
dollar in financial losses to business
turn into loss of private and vital
organization [L. Gordon et al., 2004].
information. From this paper we
MUSIC –mutation based SQL injection
have studied that different authors
In
security
2004
the
flaws
denial
Copyright © 2014 SciResPub.
in
of
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
proposed
a
number
of
26
Injection Detection
Tools
Using
countermeasures against SQLIV and
Attack Injection: An Experimental
SQLIA. The VIPER tools performs the
Study,"
penetration testing[Angelo et al.] by
Engineering (ISSRE), 2010 IEEE 21st
using SQL injection AIIDA-SQL tool,
International Symposium on, vol.,
black box scanners, augmented
no., pp.289-298, 1-4
attack tree modeling, automated fix
[J. Viegas et al., 2006] J. Viegas, W.
generator, hidden web crawling etc.
Halfond,
From this paper we can conclude
Classification
that several solutions are exists to
Attacks and Countermeasures. In
prevent SQL injection attacks but no
International Symposium on Secure
concrete solution is presents.
Software Engineering, 2006.
References
[Jiao Ma et al., 2011] Jiao Ma; Kun
[Angelo et al.] Angelo Ciampa,
Chai; Yao Xiao; Tian Lan; Wei Huang;
Corrado
, "High-Interaction Honeypot System
Software
and
A.
of
IJOART
Aaron
Visaggio,
Reliability
Orso.
A
SQL-Injection
Massimiliano Di Penta :”A heuristic-
for
based approach for detecting SQL-
Information Technology, Computer
injection
Engineering
vulnerabilities
in
Web
SQL
Injection
and
Analysis,"
Management
applications”.
Sciences (ICM), 2011 International
[Dysart & Sherriff, 2008] Dysart, F.;
Conference on , vol.3, no., pp.274-
Sherriff, M.; , "Automated Fix
277, 24-25 Sept. 2011
Generator
for
Injection
[Jie Wang et al., 2010] Jie Wang;
Attacks,"
Software
Reliability
Phan, R.C.-W.; Whitley, J.N.; Parish,
Engineering, 2008. ISSRE 2008. 19th
D.J.; , "Augmented attack tree
International Symposium on, vol.,
modeling of SQL injection attacks,"
no., pp.311-312, 10-14 Nov. 2008
Information
SQL
Management
and
Engineering (ICIME), 2010 The 2nd
[Elia et al., 2010] Elia, I.A.; Fonseca,
IEEE International Conference on ,
J.; Vieira, M.; "Comparing SQL
Copyright © 2014 SciResPub.
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
27
vol., no., pp.182-186, 16-18 April
Automated Testing
2010
Injection,"
[Khoury et al., 2011] Khoury, N.;
Applications
Zavarsky, P.; Lindskog, D.; Ruhl, R.; ,
ACSAC 2007. Twenty-Third Annual ,
"An Analysis of Black-Box Web
vol., no., pp.107-117, 10-14 Dec.
Application
2007
against
Security
Stored
SQL
Scanners
Injection,"
against
Computer
SQL
Security
Conference,
2007.
[L. Gordon et al., 2004] L. Gordon,
Privacy,
M. Loeb, W. Lucyshyn, and R.
security, risk and trust (passat), 2011
Richardson.,
ieee third international conference
computer
on and 2011 ieee third international
survey”, Technical Report RL32331,
conference on social computing
C.S.I. Computer
(socialcom) , vol., no., pp.1095-1101,
Security Institute, 2004. Accessed
9-11 Oct. 2011
from
[Kiani M et al., 2008] Kiani, M.;
www.theiia.org/iia/download.cfm?fi
Clark, A.; Mohay, G.; , "Evaluation of
le=9732 (January 2008).
Anomaly
Character
[Pinzo’n C et al., 2010] Pinzo´n, C.;
Distribution Models in the Detection
De Paz, J.F.; Bajo, J.; Herrero, A.;
of
Corchado, E.; , "AIIDA-SQL: An
“Ninth
crime
CSI/FBI
and
security
IJOART
SQL
Based
Injection
Attacks,"
Availability,
Adaptive
Reliability and Security, 2008. ARES
Detector Agent for detecting SQL
08. Third International Conference
Injection
on , vol., no., pp.47-55, 4-7 March
attacks," Hybrid Intelligent Systems
2008
(HIS),
Intelligent
2010
10th
Intrusion
International
Conference on , vol., no., pp.73-78,
[Kosuga et al., 2007] Kosuga, Y.;
23-25 Aug. 2010
Kernel, K.; Hanaoka, M.; Hishiyama,
[Shahriar, H & Zulkernine, M]
M.;
"Sania:
Shahriar,
Syntactic and Semantic Analysis for
"MUSIC:
Takahama,
Yu.;
Copyright © 2014 SciResPub.
,
H.;
Zulkernine, M.;
Mutation-based
,
SQL
IJOART
International Journal of Advancements in Research & Technology, Volume 3, Issue 1, January-2014
ISSN 2278-7763
28
Injection Vulnerability Checking,"
Intelligence,
Quality Software, 2008. QSIC '08.
Systems and Networks (CICSyN),
The Eighth International Conference
2010
on , vol., no., pp.77-86, 12-13 Aug.
Conference on , vol., no., pp.216-
2008
221, 28-30 July 2010
[Shanmughaneethi et al., 2009]
[Wei & Muthuprasanna, 2006] Wei,
Shanmughaneethi,
K.;
S.V.;
Shyni,
Communication
Second
Muthuprasanna,
International
M.;
Suraj
S.C.E.; Swamynathan, S.; , "SBSQLID:
Kothari; , "Preventing SQL injection
Securing Web Applications with
attacks
Service
Injection
Software Engineering Conference,
Detection," Advances in Computing,
2006. Australian, vol., no., pp. 8 pp.,
Control,
Telecommunication
18-21 April 2006
2009.
'09.
[Xin et al., 2010 ] Xin Wang; Luhua
International Conference on, vol.,
Wang; Gengyu Wei; Dongmei Zhang;
no., pp.702-704, 28-29 Dec. 2009
Yixian Yang; , "Hidden web crawling
Based
&
Technologies,
SQL
ACT
in
stored
IJOART
for
SQL
injection
procedures,"
detection,"
[Tajpour A et al., 2010] Tajpour, A.;
Broadband Network and Multimedia
Massrum, M.; Heydari, M.Z.; ,
Technology (IC-BNMT), 2010 3rd
"Comparison
of
IEEE International Conference on ,
detection
and
SQL
injection
prevention
vol., no., pp.14-18, 26-28 Oct. 2010
techniques," Education Technology
and Computer (ICETC), 2010 2nd
International Conference on , vol.5,
no., pp.V5-174-V5-179, 22-24 June
2010[Tajpour & JorJor Zade, 2010]
Tajpour, A.; JorJor Zade Shooshtari,
M.; , "Evaluation of SQL Injection
Detection
and
Techniques,"
Copyright © 2014 SciResPub.
Prevention
Computational
IJOART
Download