0% found this document useful (0 votes)
8 views7 pages

Intrusion Detection Framework For SQL in

Uploaded by

rafficandra0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views7 pages

Intrusion Detection Framework For SQL in

Uploaded by

rafficandra0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ASIAN JOURNAL OF ENGINEERING, SCIENCES & TECHNOLOGY,VOL.

6, ISSUE 2 SEPTEMBER 2016

Intrusion Detection Framework for SQL Injection


Israr Ali Syed Hasan Adil Mansoor Ebrahim
Faculty of Engineering Sciences & Technology Faculty of Engineering Sciences & Technology Faculty of Engineering Sciences & Technology
Iqra University Main Campus Iqra University Main Campus Iqra University Main Campus
Karachi, Pakistan Karachi, Pakistan Karachi, Pakistan
[email protected] hasan.adil @iqra.edu.pk [email protected]

Abstract—In this era of internet, E-Business and e-commerce


applications are using Databases as their integral part. These
Databases irrespective of the technology used are vulnerable
to SQL injection attacks. These Attacks are considered very
dangerous as well as very easy to use for attackers and intruders.
In this paper, we are proposing a new approach to detect
intrusion from attackers by using SQL injection. The main
idea of our proposed solution is to create trusted user profiles
fetched from the Queries submitted by authorized users by using
association rules. After that we will use a hybrid (anomaly
+ misuse) detection model which will depend on data mining
techniques to detect queries that deviates from our normal
behavior profile. The normal behavior profile will be created in Fig. 1. Three Layered Architecture
XML format. In this way we can minimize false positive alarms.

Index Terms—association rules; Intrusion detection anomaly


We will give a basic case of Injection to show the issue. The
detection; SQL Injection; Databases
attacker first tries to find the root path and Writable Directory
on the website. For example, he will write in the address bar
I. I NTRODUCTION
Database-driven web applications have gotten to be broadly www.site.com/index.php?id=10’
sent on the Internet. Companies use them to give an expansive
scope of administrations to their clients. These applications This will let him know whether the website is vulnerable to
with their databases regularly contain secret, or even confi- SQL Injection or not. Then to find the columns something
dential data, for example, a client and budgetary records. With like this can be used
the passage of time the accessibility of these applications has
expanded, there has been a relating increment in the number www.site.com/index.php?id=-10 Union Select 1, 2, 3, 4, 5—
and complexity of intrusions that target them. A standout
amongst the most genuine sorts of intrusion against web He can find the venerable column by
applications is Structured Query Language (SQL) Injection
attacks. These attacks are among the highest of the main www.site.com/index.php?id=-10 Union Select 1, 2,
vulnerabilities that a web application can have from intruders. version (), 4, 5—
As the name intimates, this kind of assault is controlled and
targeted towards the database layer of the web applications. Where we have 5 columns and columns three is vulnerable.
Most web applications are ordinarily developed in a two- or After that the attacker can load a file or Shell by using
three-layered construction modeling as described in Figure 1.
SQL Injection is a sort of code-invasion assault in which www.site.com/index.php?id=-10 Union Select 1, 2,
an assailant uses uniquely created inputs to trap the database load file(’/etc/my.cnf’),4,5—
into executing aggressor detailed database orders. It can give
the aggressors immediate access to the underlying databases Then he can check the file privileges of the current
of a web application, with that, the ability to leak, change, user for this first he will find current username.
or even erase data that is put away on them. SQL Injections
happen when information gave by a client is not appropriately www.site.com/index.php?id=-10 Union Select 1, 2,
approved and is incorporated specifically in a SQL query. current user, 4, 5—

1
Whatever remains of the paper will be sorted out as follows:
This will return a user name that will be used in this statement in section II we will examine past work, Section III will give
a point by point depiction about the SSF and its segments.
www.site.com/index.php?id=-10 Union Select 1, 2, AD and MD algorithms and a working case will be displayed
file priv, 4, 5 FROM mysql.user WHERE user=username- in Section IV. Section IV finishes up the paper and diagrams
future work.
One component to protect against web assaults is to
utilize intrusion detection systems and particularly network II. LITERATURE REVIEW
intrusion detection systems (NIDS). NIDS can use misuse Diverse investigates and methodologies have been displayed
detection (MD) or anomaly detection (AD) or both methods to address the issue of web assaults against databases. Consid-
to safeguard against assaults. An intrusion detection systems ering SQL Injection as top most risky assaults, as expressed in
(IDS) that utilize the anomaly detection (AD) method make a area I, there has been extraordinary research in identification
standard of typical usage examples, and anything that broadly and anticipation systems against this assault [1, 2, 3]. We can
strays from it gets hailed as a possible interruption. Misuse characterize these methodologies into two general classes:
detection (MD) identification system utilizes particularly a) One methodology is attempting to identify SQL Injection
known examples of unapproved conduct to foresee and catch through checking peculiar SQL query structure.
resulting comparable attack. These known examples are b) An alternate methodology utilizes information conditions
sometimes referred as Signature. among information things which are more averse to change
Tragically, NIDS are not productive or even helpful in for recognizing noxious database exercises.
web interruption detection. Since numerous web assaults In both of two classifications, distinctive analysts exploit
concentrate on applications that have no confirmation on the the profit of coordinating information mining with database
underlying network or framework exercises, they are seen interruption location keeping in mind the end goal to minimize
as an ordinary movement to the general NIDS and pass false positive alarms, minimizing human intercession and bet-
through them effectively. NIDS are basically sitting on the ter distinguish assaults [4]. In addition, Different interruption
lower (network/transport) level of network model while web identification strategies are utilized either independently or
administrations are running on the higher (application) level. together. Distinctive work utilized abuse procedure others
So, In this paper, we propose a new mechanism that joins utilized abnormality or blends the two systems.
together the two IDS procedures, AD and MD, to shield Under the first class and without utilizing information mining
against SQL Injection Attacks. The primary thought of our method, Lee et al. in [5] and Low et al. in [6] created a
SQL Injection Shield Framework (SSF) structure is to make structure focused around fingerprinting transactions for recog-
a profile for web applications that can present to the normal nizing pernicious transactions. They investigated the different
behavior of users regarding SQL queries they submit to the issues that emerge in the examination, representation and
database. Database logs could be utilized to gather these true synopsis of this possibly enormous set of authentic transac-
blue questions given that these logs are free of interruptions. tion fingerprints. An alternate work that applies peculiarity
We then utilize SSF framework focused around data mining identification strategy to distinguish odd database application
techniques to distinguish queries that deviates from the profile conduct is exhibited by Valeur et al. in [7]. It constructs various
of normal queries. The queries recovered from database log distinctive factual question models utilizing a set of regular
are put away in XML document with predefined structure. We application questions, and after that captures the new queries
pick XML Format on the grounds that it is more organized submitted to the database to check for atypical conduct.
than level records, more adaptable than matrices, easier and A general skeleton for recognizing noxious database trans-
devour less capacity than databases. action examples utilizing information mining was proposed
We can then use association rules on the XML File. These by Bertino et al. in [8] [9] to mine database logs to struc-
rules are description of the profile of typical conduct and ture client profiles that can display ordinary practices and
any deviation from this profile will be considered an attack. recognize abnormal transactions in databases with part based
Keeping in mind the end goal is to better distinguish SQL access control instruments. The framework has the capacity
Injection Attacks and to minimize false positive alerts, SSF distinguish interlopers by distinguishing practices that contrast
system as a second step uses misuse procedure to catch any from the typical conduct of a part in a database. Kamra et
change in the structure of the query. Vindictive clients now al. in [10] represented an upgraded model that can likewise
and then don’t change the determination provision, however distinguish gatecrashers in databases where there are no parts
include an alternate SQL articulation or add particular connected with every client. It utilizes bunching systems to
essential words to the introductory query to check the structure succinct profiles speaking to typical client practices
helplessness of the site to SQL Injection Attacks or to for distinguishing suspicious database exercises. An alternate
perform inference attack. Such sorts of attacks are identified approach that checks for the structure of the question to recog-
in the second step of the SSF. By looking at the structure of nize malevolent database conduct is the work of Bertino et al.
the query under test with the comparing queries in the XML in [11]. They proposed a system focused around inconsistency
document the past pernicious activities will be recognized. recognition strategy and affiliation tenet mining to distinguish

2
the query that goes astray from ordinary database application recommend to run this framework at the database end when
conduct. all possible SQL injection attacks are meant to be detected.
The issue with this schema is that it delivers a considerable In this framework we will define a new hybrid approach of
measure of guidelines and speaks to the questions in extremely anomaly detection and misuse detection. The key thought of
enormous networks, which may influence hugely on the exe- our structure is that we fabricate a store containing set of
cution of standard extraction. Abuse discovery procedure have genuine questions submitted from the application client to
been utilized by Bandhakavi et al. in [12] to locate SQL Injec- the database. This store is actually our training dataset. We
tion Attacks by finding the purpose of a question powerfully then utilize an inconsistency discovery methodology focused
and afterward looking at the structure of the distinguished around data mining procedure to assemble a profile of ordinary
query with typical queries focused around the client data with application conduct and show queries that goes amiss from
the found plan. The issue with this methodology is that it this typical conduct. In a second venture in the proposed
needs to get to the source code of the application and make a framework we check for the presence of hazardous magic
few changes to the java virtual machine. words in the query if the last breezes through the test of
Halfond et al. in [13] created a strategy that utilize an approach abnormality identification step. We require this step in light
to place illegal questions on the database. In its static part, the of the fact that in some cases the plan of the attacker is
system uses program examination to regularly collect a model to distinguish the security gaps in the site or to derive the
of the true request that could be made by the application. In structure of the database through the slip message came back
its dynamic part, the method uses runtime seeing to survey the from the application. This sort of assault can’t be caught
alterably created queries and check them against the statically- through AD system in light of the fact that it doesn’t oblige
manufactured model. The framework WASP proposed by change in the states of the first query yet it will be found if the
Wiliam et al. in [14] tries to counteract SQL Injection Attacks structure of the question is thought about against its comparing
by a system called positive spoiling. In positive spoiling, the query in the storehouse document. Taking into account what a
trusted piece of the question (static string) is not considered while ago expressed, we now know that the framework (SSF)
for execution and conceal as polluted, while all different works in two stages: one is the training stage and the other is
inputs are considered. The trouble for this situation is the detection stage. The accompanying subsections we will give
engendering of corrupts in an query crosswise over capacity a nitty gritty clarification of the schema, its parts and how it
calls particularly for the client characterized capacities which functions.
call some other outside capacities prompting the execution of a
spoiled question. Distinctive different examines took after the A. Training Phase
same approach in location of bizarre SQL question structure In the training stage the training records are gathered from
in [15] [16]. the queries the application send to the database. The source
Scrutinizes that fit in with the second classification of discov- for getting these query traces is the database log gave that
ery which relies on upon information conditions are [17] [18] the latter is free of intrusions. The training stage stream is
[19] [20]. The work that is focused around mining successive outlined in Fig. 3. The test here is that to proficiently encode
information access designs for database interruption discovery these queries, keeping in mind the end goal to concentrate
was proposed by Hu et al. in [17] [18]. Transactions that don’t helpful peculiarities from them and appropriately construct the
consent to govern created from read and compose arrangement application finger impression. Not at all like methodology gave
sets are recognized as noxious transactions. Srivastava et al. in [11], we decide to encode the questions in XML record.
offered a weighted grouping digging methodology [17] for The encoding plan gave by Bertino et al. in [11] bring about
catching database assaults. The playing point of the work a substantial, thick, scanty frameworks which may impact
displayed by Yihu et al. in [18] is the programmed disclosure on the mining calculation. XML is more organized than flat
and utilization of vital information conditions, to be specific, records, is upheld by question tools like Xquery and XPath to
multi-dimensional and multi-level information conditions, for concentrate information [21]. It is less difficult and expends
recognizing bizarre database transactions. less space than relational databases and more adaptable than
The commitment of this paper is a framework (SSF) that grids.
consolidates AD and MD procedure keeping in mind the end It is vital to recognize precisely the structure of the XML
goal to better distinguish SQL Injection Attacks. This schema record that will speak to the peculiarities separated from
utilizes association standard rules with an AD system to the queries that will help in building the application finger
manufacture the ordinary conduct of use, clients and locating impression. The principle playing point of XML usage here
irregular queries. Additionally, MD is utilized to check the is that XML nodes tags may be copied or duplicated upon
structure of the query to recognize any noxious activities that need. For instance the number of ID Tags may contrast from
can’t be recognized utilizing AD method. one ”query” Tag to an alternate relying upon the query itself.
This is the reason it is more suitable to store questions than
III. THEORETICAL FRAMEWORK databases while keeping up adaptability and effortlessness.
Our Proposed framework (SSF) will detect intrusion be- The XML document represented in the diagram, where this
fore query execution at database end. For this reason we phase is depicted, actually stores the projection attributes

3
concentrated and put away with the standard profile will be
considered assault. More insights about how the standards
are concentrated are given in the accompanying subsection.

Fig. 2. Training Phase

and from clause of SQL Query and the predicate part of the
query in a more itemized way. It is not vital to recognize
the estimation of the whole integer number or string element Fig. 3. XML file containing Queries
but it is essential to establish that there is a number or string
element or there is an alternate property in the right hand side
of the SQL Query that is an effort of injection. An alternate
B. ANOMALY DETECTION PHASE
record that ought to be made amid the preparing stage is the
signature file that will be utilized amid the misuse location In the past subsection, we showed how the generous
stage. As expressed before this record contains suspicious queries are gathered and caught in XML format in a structure
decisive words that may be viewed as an indication of empowering the framework we have proposed from making
intrusion detection by using SQL injection. the database behavior profile. After this we can apply rules
Words like for instance single quote, semicolon, twofold on the XML record containing real questions and concentrate
dash, union, executive, request by and their hexadecimal decides that can depict the ordinary conduct of user that
representation with a specific end goal to keep the distinctive is they are normal users or attackers. The thought behind
avoidance strategies [22] are signs of injections. The vital building the profile guideline is to apply one of affiliation
and the most important venture in the preparation stage is rules calculations on a while ago made XML record to
to fabricate the profile speaking to the application typical or concentrate connection between each one table in the query
normal behavior. The baseline from which we can decide with every determination characteristic barring the literals. In
what is good and what is wrong. We will apply association this way the standards concentrated have the accompanying
principles [23] on the XML file created from the database format:
log record to concentrate and decides what speak to the
ordinary or normal conduct of use. We found that different From → LHS
methodologies and approaches have been proposed to apply From → RHS
association rules on XML Nodes and data. We found that
the approach presented by [24-26] for an in-depth overview The rule that surpasses the base backing and certainty will
of these methodologies is very useful and easy to use. be put away in a separate rule profile. These rules speak
The guidelines concentrated speak to relationship between to the profile of how the application carries on typically.
each one table in the query with each one predicate in the Fig. 5 shows the stream of recognition period of the schema
determination condition. when all is said in done including the anomaly method.
This is focused around a perception that the static piece of When a database application is built, the fact and figures
the query is the projection characteristic and the part that are usually supplied by the client develop the where clause
is built amid execution is the determination part [11]. Here of the query. In the meantime, the projection clause and
we add an alternate thing to the static part which are the the from clause stay static at the run time. So we make a
tables in the from statement. After that we will attempt to connection between the static and the dynamic piece of the
make connections between the static part and the element query and any change in the where clause by aggressors
part and concentrate guideline with backing and certainty that can’t be gotten from the standards profile will be
of such connection. Any query that won’t match tenets published as an attack. We chose to pick the tables in the

4
from clause from the static piece of the question rather bringing about false positive caution. This is the reason the
than the projection characteristics on the grounds that the proposed framework checks for the structure of the query
previous is more general and contain the most recent and under test with the comparing query put away in XML
therefore creating less controls and make it less demanding in record. The recognition stage stream of the framework in
correlation. Lets have another example of SQL injection attack Fig. 5 represents this methodology. These suspicious magic
words are put away in record called magic words”. This
Select username, password from admin where fname= or record contains SQL decisive words like single quote, request
1=1 - - by, union select, semicolon, executive and their hexadecimal
representation to maintain a strategic distance from the diverse
Before executing this query, rules ought to be concentrated avoidance systems. After affirming the presence of one or
first furthermore contrasted with the standards in the normal a greater amount of these pivotal words, we use XQuery to
user profile. The connection in the middle of tables and recover questions from XML file with the same projection
attributes will be analyzed against normal user profile put attributes and same from clause. At that point examination is
away in the profile guidelines record. The two relations under carried out between query under test and the query recovered
test from the past sample are: by Xquery from XML record. In the event that there is no
match then the query is advertised abnormality.
Admin → username
Admin → 1

The primary connection exists in the normal user profile yet


no such run the show matches the second one, so the query
is published as SQL injection attack.
C. MISUSE DETECTION PHASE
In a second venture in the SQL injection detection process
and after the anomaly recognition stage, comes the part of
misuse identification. The need for this step originates from
the way that SQL injection techniques doesn’t just change
the conditions in the query yet it additionally may give data
about the database pattern or check the defenselessness of
the application to SQL injection. This is carried out through
adding to the query a few watchwords that may change the
conduct of the question or return data about the database
through database lapses without changing the predicates of
the query. In such case, the anomaly identification stage
won’t have the capacity to find such assault. For example
consider the following scenario

Select * from admin where ID=10

On the off chance that the aggressor simply includes a


single quote toward the end of the question, this will bring Fig. 4. Proposed framework flow
about blunder message that may illuminate the assailant that
the site is helpless against SQL Injection and he can perform IV. ALGORITHM AND WORKING EXAMPLE
his tricks. An alternate case of assault is simply including the
In this segment we exhibit calculations for anomaly as
essential word ”order by” to the query without changing the
well as misuse recognition. What’s more, we give a working
determination characteristics like:
illustration outlining how the proposed framework skeleton
performs the detection.
Select * from admin where ID=10 order by 1
A. Algorithm for anomaly detection
Attempting to execute this query a few times will give
attacker data about the quantity of fields in the table. This Inputs:
is why this step is required in the identification process. 1. Rules from Normal profile
Additionally, our framework doesn’t declare the query as 2. Query submitted
abnormal just by discovering these keywords in the query on
the grounds that it might be part of the genuine query itself

5
Output:
1. True if query is intrusion
2. False if query is not intrusion

Start:
1. Fetch relationship between tables and selection fields from
Query
2. Save Fetched relations in query relation array
3. Iterate each relation r in query relation array
a. If (r is found in normal user profile(r) )
i. score=score+1
ii. If score = =length of query relation array
Return false
iii. Else
Return true
4. End

B. Misuse detection algorithm

Inputs:
1. Magic keywords file
2. Query under test
3. XML file

Output:
1. True if query is intrusion
2. False if query is not intrusion

Start:
1. Iterate each keywords m in Magic keywords File
2. If k not exists in Query
a. Return false
3. Else
a. Use XQuery language to extract relevant queries from
XML file
b. If query structure doesnt match any retrieved queries
Return True
c. Else Fig. 5. XML file representing queries
Return false
4. End
In the wake of applying affiliation rules calculation like for
V. WORKING EXAMPLE instance Apriori on this XML record, the ensuing principles
To give better understanding of the anomaly and misuse will put away in standards profile document like in Fig. 6.
identification in proposed framework system, we give in this In the accompanying we will give specimen of vindictive and
subsection illustration of the stream of intrusion detection malicious queries.
either inconsistency or misuse in this framework. The ac- • Select username, password from admin where id=5
companying speaks to illustration of queries submitted from The initial phase in the system is to distinguish connection in
application to database: the middle of tables and selection attributes in the query.
• Select username, password from admin where id=?
• Select username, password from admin where id<? Admin → id
• Select * from admin where username=? order by user-
name Second, the proposed framework hunt in the rules profile
• Select username, product from admin where salary<? and down this table. It as of now exists. However this is not the
IsActive=? end of the intrusion detection mechanism. The second step
Our proposed framework will generate XML file like this is to check for suspicious pivotal magic words in the query.
The query as of now contains one of the suspicious pivotal

6
magic words which is single quote. [4] S. F. Yusufovna., Integrating Intrusion Detection System and Data Min-
So XQuery techniques is utilized to fetch questions from the ing, International Symposium on Ubiquitous Multimedia Computing,
2008
XML document with same from characteristics and same [5] Lee, S. Y., Low, W. L., and Wong, P. y.: Learning Fingerprints for
from clause. By contrasting the structure of the query under a Database Intrusion Detection System. In the Proceedings of the 7th
test and question came back from the XML document we European Symposium on Research in Computer Security, 2002
[6] Low, W. L., Lee, S. Y., Teoh, P., DIDAFIT: Detecting Intrusions in
will find that query shouldn’t contain the single quote and Databases through Fingerprinting Transactions, in Proceedings of the 4th
along these lines it is affirmed as intrusion. International Conference on Enterprise Information Systems (ICEIS),
2002
• Select username, password from Admin where id=1 or
[7] F. Valeur, D. Mutz, and G.Vigna, A learning-based approach to the
1=1- - detection of sql injection attacks, in proceedings of the conference
on detection of intrusions and Malware and vulnerability assessment
The initial phase in the system is to distinguish connection in (DIMVA), 2005
the middle of tables and selection attributes in the query. [8] Bertino, E., Kamra, A, Terzi, E., and Vakali, A, Intrusion detection in
RBAC-administered databases, in the Proceedings of the 21st Annual
Computer Security Applications Conference, 2005
Admin → id [9] Kamra A, Bertino, E., and Lebanon, G.,Mechanisms for Database Intru-
Admin → 1 sion Detection and Response, in the Proceedings of the 2nd SIGMOD
PhD Workshop on Innovative Database Research, 2008
[10] Kamra A, Terzi E., and Bertino, E.,Detecting anomalous access patterns
If we search in our proposed framework we will find in relational databases, the VLDB Journal VoU7, No. 5, pp. 1063-1077,
that rule for first relation exists but not for the second one 2009
therefor this query is affirmed as intrusion. [11] Bertino, E., Kamra, A, and Early, J., Profiling Database Application to
Detect SQL Injection Attacks, In the Proceedings of 2007 IEEE In-
VI. CONCLUSION AND FUTURE WORK ternational Performance, Computing, and Communications Conference,
2007
Intrusion using web vulnerabilities is a real risk to any [12] Bandhakavi, S., Bisht, P., Madhusudan, P., and Venkatakrishnan V.,
CANDID: Preventing sql injection attacks using dynamic candidate eval-
organization putting away profitable and classified information uations, in the Proceedings of the 14th ACM Conference on Computer
in databases. This is progressively all the more so as the and Communications Security, 2007
quantity of database servers joined with the Internet incre- [13] Halfond, W. G. and Orso, A , AMNESIA: Analysis and Monitoring
for Neutralizing SQL-Injection Attacks, in Proceedings of the 20th
ments quickly. Existing network-based detection system and IEEE/ACM international Conference on Automated Software Engineer-
also interruption identification frameworks are most certainly ing, 2005
not sufficient for recognizing database interruptions. We have [14] William G.J. Halfond, Alessandro Orso, and Panagiotis Manolios,
WASP: Protecting Web Applications Using Positive Tainting and Syntax-
presented a framework focused around anomaly and misuse Aware Evaluation, IEEE Transactions on Software Engineering,
identification for finding SQL injection. We have introduced Vol. 34, No. 1, pp 65-81, 2008
another encoding strategy for SQL query in XML file as it [15] Buehrer, G., Weide, B. w., and Sivilotti, P. A, Using Parse Tree
Validation to Prevent SQL Injection Attacks, in Proceedings of the 5th
were empowering the extraction of typical conduct of database international Workshop
application. We then utilized data mining strategy for finger- [16] Liu, A, Yuan, Y., Wijesekera, D., and Stavrou, A, SQLProb:A Proxy-
printing SQL articulations and use them to recognize SQL based Architecture towards Preventing SQL Injection Attacks, in Pro-
ceedings of the 2009 ACM Symposium on Applied Computing, 2009
Injection intrusions. We want to perform examinations to apply [17] Hu, Y., and Panda, B., A Data Mining Approach for Database Intrusion
this schema to distinguish its execution in locating assaults Detection, In Proceedings of the 19th ACM Symposium on Applied
and incorporate examinations to different methodologies. This Computing, Nicosia, Cyprus ,2004
[18] Srivastava, A, Sural S., and Majumdar, AK., Database Intrusion Detec-
work may be developed to incorporate identification against tion Using Weighted
different assaults like cross site scripting. [19] O. Maor and A. Shulman, SQL Injection Signatures Evasion, White pa-
per, Imperva, April 2004. http://www.imperva.com/application defense
R EFERENCES center/white papers/sql injection signatures evasion.html
[20] Han J., Kamber M., Data Mining: Concepts and Techniques, Maurgan
[1] W.G.Halfond, J.Viegas, and A.Orso, A classification of SQL-Injection Kaufmann, 2nd edition, 2006
Attacks and Countermeasures, in proceeding of the International Sym- [21] Jacky W.W.Wan, Gillian Dobbie, Mining Association Rules from XML
posium on Secure Software Engineering (ISSSE), 2006 Data using XQuery, in proceeding of ACM 2nd workshop on Aus-
[2] Kindy, D.A.; Pathan, A.K, A survey on SQL injection: Vulnerabilities, tralasian information security, Data Mining and Web Intelligence, and
attacks, and prevention techniques, in proceedings of IEEE 15th Inter- Software Internationalization, 2004
national Symposium on Consumer Electronics (ISCE), 2011 [22] Qin Ding, ”Data Mining on XML Data”, in Encyclopedia of Data
[3] N. Khochare, S. Chalurkar ,S. Kakade, B.B. Meshramm, Survey on Warehousing and Mining, 2nd edition, Vol. 1, ed. John Wang, IGI
SQL Injection attacks and their countermeasures, International Journal Global, 2008, pp. 506-510
of Computational Engineering & Management (IJCEM), Vol. 14, [23] Qin Ding and Gnanasekaran Sundarraj, ”Mining Association Rules from
October 2011 XML Data”, in Data Mining and Knowledge Discovery Technologies,
ed. David Taniar, IGI Global, 2008. pp. 59-7

You might also like