SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Title | SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Lin, P., Jinshuang, W., Ping, C., Lanjuan, Y. |
Conference Name | 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE) |
Date Published | Sept. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-8304-6 |
Keywords | Big Data, command injection attacks, composability, dangerous threat, database management systems, database protection, Databases, firewalls, Firewalls (computing), GreenSQL, GreenSQL database firewall, GreenSQL learning, GreenSQL pattern input whitelist, Information systems, input model, intercept samples, Internet, internet technology, IP networks, Metrics, optimized whitelist, Pattern, patterned input, pubcrawl, resilience, Resiliency, SQL, SQL Injection, SQL injection attack, SQL injection attack command, Whitelist, Whitelists, working mode |
Abstract | With the rapid development of Internet technology, the era of big data is coming. SQL injection attack is the most common and the most dangerous threat to database. This paper studies the working mode and workflow of the GreenSQL database firewall. Based on the analysis of the characteristics and patterns of SQL injection attack command, the input model of GreenSQL learning is optimized by constructing the patterned input and optimized whitelist. The research method can improve the learning efficiency of GreenSQL and intercept samples in IPS mode, so as to effectively maintain the security of background database. |
URL | https://ieeexplore.ieee.org/document/9236824 |
DOI | 10.1109/ICISCAE51034.2020.9236824 |
Citation Key | lin_sql_2020 |
- Resiliency
- internet technology
- IP networks
- Metrics
- optimized whitelist
- Pattern
- patterned input
- pubcrawl
- resilience
- internet
- SQL
- SQL injection
- SQL injection attack
- SQL injection attack command
- Whitelist
- Whitelists
- working mode
- Big Data
- intercept samples
- input model
- Information systems
- GreenSQL pattern input whitelist
- GreenSQL learning
- GreenSQL database firewall
- GreenSQL
- Firewalls (computing)
- firewalls
- Databases
- database protection
- database management systems
- dangerous threat
- composability
- command injection attacks