2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.123
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks

Abstract: The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become prominent is the SQL injection attack. SQL injection attacks can potentially result in unauthorized access to confidential information stored in a backend database. In this paper we describe an anomaly based approach which utilizes the character distribution of certain sections of HTTP requests to detect previously unseen SQL injection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…Through the syntactic analysis of SQL query strings, the data of the HTTP requests are extracted to later be used in the training phase and to determine the threshold to use in the evaluation phase. Bertino, Kamra and Early [5] propose an anomaly detection mechanism applying data mining techniques. The main problem of this approach is to find an adequate threshold to maintain a low rate of both false positives and false negatives.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…Through the syntactic analysis of SQL query strings, the data of the HTTP requests are extracted to later be used in the training phase and to determine the threshold to use in the evaluation phase. Bertino, Kamra and Early [5] propose an anomaly detection mechanism applying data mining techniques. The main problem of this approach is to find an adequate threshold to maintain a low rate of both false positives and false negatives.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
“…In [5] two types of SQL injection attacks are raised: tautology attacks and those based on the UNION operator. Through the syntactic analysis of SQL query strings, the data of the HTTP requests are extracted to later be used in the training phase and to determine the threshold to use in the evaluation phase.…”
Section: Sql Injection Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Kiani et al [12], used an anomaly detection approach. They called the model as same character comparison (SCC) model where HTTP request"s section were divided on the basis of character.…”
Section: Literature Surveymentioning
confidence: 99%