Preventing SQL injection attacks by automatic parameterizing of raw queries using lexical and semantic analysis methods

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

SQL Injection (SQLI) is one of the most important security threats to web applications. Many techniques have been proposed for counteracting SQLI Attacks (SQLIAs); however, second-order attacks and the injection attacks that raise data-type mismatch errors have been ignored in most of them. In this paper, we propose a new anomaly-based method (deployed as a proxy between the application server and its database server) for detection and/or prevention of SQLIAs without requiring any modification to the source code of vulnerable applications. The majority of attacks, which lead to a change in the syntax of application queries, are identified in the detection phase by lexical analysis of the queries. The remaining types of attacks, such as second-order attacks and attacks generating data-type mismatch errors, are prevented in the prevention phase, where each query is automatically converted to a parameterized query (before submitting to the database) using a semantic analysis method.

Cite

CITATION STYLE

APA

Samarin, D., & Amini, M. (2019). Preventing SQL injection attacks by automatic parameterizing of raw queries using lexical and semantic analysis methods. Scientia Iranica, 26(6), 3469–3484. https://doi.org/10.24200/sci.2019.21229

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free