Journal on Communications ›› 2016, Vol. 37 ›› Issue (2): 89-98.doi: 10.11959/j.issn.1000-436x.2016034

• academic paper • Previous Articles     Next Articles

Approach to detecting SQL injection behaviors in network environment

Yu-fei ZHAO1,Gang XIONG2,Long-tao HE3,Zhou-jun LI1   

  1. 1 School of Computer Science, Beihang University, Beijing 100083, China
    2 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
  • Online:2016-02-26 Published:2016-02-26
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Key Technology R&D Program;The Strategic Priority Research Program of the Chinese Academy of Sciences

Abstract:

SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. Firstly the process of SQL injection attack was analyzed, and then the differences between attack traffic and normal traffic HTTP request length, HTTP connections and feature string were discovered. Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. The results of experiments indicated that in simulation environments the recall of LFF approach reach up to 95%, and in real network traffic the LFF approach also get a good detection result.

Key words: Web security, SQL injection, network traffic, outlier detection

No Suggested Reading articles found!