A Review On SQL Injection Prevention Technique: Navu - Verma@yahoo - in
A Review On SQL Injection Prevention Technique: Navu - Verma@yahoo - in
A Review On SQL Injection Prevention Technique: Navu - Verma@yahoo - in
Navjot Verma
M. Tech CSE
Department of computer Science
PURCITM, Mohali (Punjab)
Amardeep Kaur
Assistant Professor
Department of computer Science
PURCITM, Mohali (Punjab)
navu.verma@yahoo.in
amardeep_tiet@yahoo.com
Injection,
SQL
Introduction
SQL injection attack allows attackers to
gain control of the original query, illegal
access to the database and extract or
transform the database [1]. The main cause
of SQL injection vulnerabilities is:
attackers use the input support to attack
strings that contains special database
commands. An SQLIA occurs when an
attacker changes the SQL control by
inserting new keywords [2]. A successful
SQLI attack hinder privacy integrity and
availability of information in the database.
In most of cases, SQL Injection is used to
initiate the denial of service attack on web
applications. The strictness of the attacks
depends on the role or account on which
the SQL statement is executed.
An attacker needs to know loop holes in
the application before launch an attack.
Literature Survey
SQL-ID
Kemalis and Tzouramanis have suggested
novel specification-based methodology for
the detection of exploitations of SQL
injection vulnerabilities in Specification
based approach on SQL Injection
detection [3]. The proposed queryspecific detection allows the system to
perform focused analysis with a small
computational overhead and produces no
false Positives or false negatives.
AMNESIA - AMNESIA approach for
tracing SQL input flow and generating
attack input,JCrasher for generating test
cases,
and
SQLInjectionGen
for
identifying hotspots. The experiment was
conducted on two Web applications
running on MySQL1 1 v5.0.21. Based on
three attempts on the two databases,
SQLInjectionGen was found to give only
two false negatives in one attempt. The
proposed
framework
is
efficient
considering the fact that it emphasizes on
attack input precision. Besides that, the
attack input is properly matched with
method arguments. The only disadvantage
of this approach is that it involves a
number of steps using different tools.
SQLrand Scheme - SQLrand approach is
proposed by Boyd and Keromytis. For the
implementation, they use a proof of
concept proxy server in between the Web
server (client) and SQL server; they derandomized queries received from the
client and sent the request to the server.
This de-randomization framework has 2
main advantages: portability and security.
The proposed scheme has a good
Comparison
The following is a comparison of various SQL injection prevention techniques along with the
types of attack they can prevent.
Schemes
Tautology
AMNESIA
SQLrand
CANDID
SQLGuard
SQLIPA
Negative
Tainting
YES
YES
YES
YES
YES
YES
Logicall
y
Incorrect
Queries
YES
NO
NO
NO
YES
YES
Union
Query
Stored
Procedure
Piggy
Inference
Backed Attack
Queries
Alternating
Encoding
Attack
YES
NO
NO
NO
YES
YES
NO
NO
NO
NO
NO
NO
YES
YES
NO
NO
YES
YES
YES
NO
NO
NO
YES
YES
Conclusion
References
[1]
A. S. Gadgikar, Preventing SQL
injection attacks using negative tainting
approach,
in
IEEE
International
Conference on Computational Intelligence
and Computing Research, 2013, pp. 15.
[2]
W. G. J. Halfond, A. Orso, and P.
Manolios, Using positive tainting and
syntax-aware evaluation to counter SQL
injection attacks, in Proceedings of the
14th ACM SIGSOFT International
Symposium On Foundations of Software
Engineering - SIGSOFT 06/FSE-14,
2006, pp. 175185.
[3]
S. Roy, A. K. Singh, and A. S.
Sairam, Detecting and Defeating SQL
Injection Attacks, International Journal
of
Information
and
Electronics
Engineering., vol. 1, no. 1, pp. 3846,
2011.
[4]
S. Bangre and A. Jaiswal, SQL
Injection Detection and Prevention Using
Input Filter Technique, International
Journal of Recent Technology and
YES
YES
NO
NO
YES
YES
[9]
Generation
to
Secure
SQL
Statements [ Short presentation
paper ], 2007.
[13] K.-X. Zhang, C.-J. Lin, S.-J.
Chen, Y. Hwang, H.-L. Huang, and F.H. Hsu, TransSQL: A Translation and
Validation-Based Solution for SQLinjection Attacks, 2011 First Int.
Conf. Robot. Vis. Signal Process., pp.
248251, Nov. 2011.